Advance your hacking skills with this comprehensive course focusing on sophisticated exploitation and scripting techniques. Begin with mastering Man-in-the-Middle (MITM) attacks, where you’ll explore the ARP protocol, install and troubleshoot MITMf, and perform advanced attacks like HTTP traffic sniffing and DNS spoofing. You'll also learn how to hook browsers with BEEF, clone web pages, and capture screenshots, providing a robust foundation in MITM attack methodologies.
Advanced Exploitation and Scripting Techniques
This course is part of The Complete Ethical Hacking Bootcamp: Beginner To Advanced Specialization
Recommended experience
What you'll learn
Comprehend and apply Python scripts for hacking purposes.
Develop and implement advanced backdoors with persistence and command execution.
Design and integrate keyloggers with backdoors.
Construct brute force attackers and evaluate methods to bypass security measures.
Skills you'll gain
Details to know
Add to your LinkedIn profile
September 2024
3 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, we will delve into the intricacies of Man in the Middle (MITM) attacks. You will learn the basics of the ARP protocol, install MITMf, perform manual ARP spoofing, and execute advanced MITM techniques such as DNS spoofing, HTTPS password sniffing, and browser hooking with BEEF.
What's included
11 videos1 reading
In this module, we will cover the foundational aspects of Python programming. You will learn about variables, input handling, control structures like if-else statements and loops, as well as functions, classes, and file operations. This knowledge will be essential for developing scripts and tools in the subsequent modules.
What's included
11 videos
In this module, we will guide you through developing an advanced backdoor. You will learn the theory behind reverse shells, write server and client code, send and receive messages, execute commands, and add persistence. Additionally, you will learn to capture screenshots and embed the backdoor in images, ensuring a comprehensive understanding of backdoor development.
What's included
21 videos1 assignment
In this module, we will focus on developing a keylogger. You will learn to import the Pynput library, write a simple keylogger, add a reporting function, and write keystrokes to a file. Additionally, you will integrate the keylogger with your reverse shell, enhancing its capabilities for data capture.
What's included
7 videos
In this module, we will teach you how to develop a brute force attacker. You will learn to print banners, add available options, start threads for attacks, and create functions to execute the brute force attack. Additionally, you will learn to bypass antivirus programs and send malware using spoofed emails, ensuring a robust and effective attack tool.
What's included
7 videos1 reading2 assignments
Recommended if you're interested in Computer Security and Networks
Why people choose Coursera for their career
New to Computer Security and Networks? Start here.
Open new doors with Coursera Plus
Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.