This document outlines an 8 module Python exploit writing course covering topics like Python fundamentals, file and network programming, web application security, exploit writing, malware analysis, and automation. The course teaches skills for sniffing networks, injecting packets, analyzing binaries, debugging processes, and automating attack tasks using Python libraries and tools.
This document outlines an 8 module Python exploit writing course covering topics like Python fundamentals, file and network programming, web application security, exploit writing, malware analysis, and automation. The course teaches skills for sniffing networks, injecting packets, analyzing binaries, debugging processes, and automating attack tasks using Python libraries and tools.
Introduction to Python Data Types and variables Statement Documentations and help String Revisited Control Flow and Data structure Functions ,Functional Programming and File Handling Accessing the network and Internet Exception Handling Modular Programming Object Oriented Programming Modules, Packages and Distribution Configure Python in Linux and Unixes Configure Python in Windows How to use Python in Mobiles: iPhone and Androids Python Program Portability Python Framework and IDes Module 2: Managing files ,directory and Security Input/output file system in Python Creating Managing File and Directory Access use of Multithreading and Concurrency how ,what and why Inter Process Communication (IPC) how to set Permissions and Controls. Module 3: Creating Sniffers and packet injector An Introduction to Raw Socket basics Python Database access Porting Python code Socket Programming with Python Servers and Clients architecture Creating Sniffers(wired and wireless)
Introduction to web server and Application server Client Side scripting
Intro to web application and penetration testing in web application
HTML and XML file analysis Web Browser Equality Attacking Web Services and Countermeasure how and why to use Application Proxies and Data Mangling SQL and XSS attacks on web Application Intro to Buffer overflow and CSRF Module 5: Exploitation Writing and Analysis Automation Exploit Writing Implementation Immunity Debuggers and Libs creating plugins in Python Binary data analysis Exploit analysis Automation
Module 6: Malware Analysis and Reverse Engineering
Basics of Process Debugging Pydbg and its applications Analyzing live applications Setting breakpoints, reading memory etc. In-memory modifications and patching Module 7: Setting Attack Task Automation Task Automation with Python Libraries and Applications Module 8: Conclusion and Checklist Course consolidation Interesting project ideas to pursue
The Intel microprocessors: 8086/8088, 80186/80188, 80286, 80386, 80486, Pentium, Pentium Pro processor, Pentium II, Pentium III, Pentium 4, and Core2 with 64-bit extensions: architecture, programming, and interfacing 8th ed Edition Barry B Brey download pdf