This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hacking the Windows API with Python - Real Ethical Hacking
1.INTRODUCTION
1.Introduction (0:45)
2.SETTING UP
1.Setting Up Your Professional Portfolio (4:33)
2.Installing Python & Tools on Windows (5:34)
3.WINDOWS API OVERVIEW
1.Windows Internals (6:54)
2.The Windows API Call (10:59)
4.THE API BASICS & HOOKING INTO A WINDOWS PROCESS
1.Hello World Windows API Style (14:02)
2.Gaining a Handle to a Windows Process (14:36)
3.First Project - ProcKiller (2:43)
4.First Project - ProcKiller - Walkthrough Part 1 (10:14)
5.First Project - ProcKiller - Walkthrough Part 2 (10:18)
5.MORE ADVANCED WINDOWS API CALLS
1.Windows Internal Structures (8:42)
2.Spawning a Process (13:39)
3.Undocumented API Calls (10:49)
6.ABUSING WINDOWS TOKENS
1.What are Token Privileges (3:35)
2.Opening a Processes Access Token (8:00)
3.Checking a Processes Token Privileges (17:54)
4.Modifying a Processes Token Privileges (12:09)
5.Second Project - Impersonation Tool (2:47)
6.Second Project - Impersonation Tool Walkthrough (9:46)
7.COMPILING PYTHON TO PE_EXE
1.Compiling Python to an EXE (2:27)
8.CONGRATULATIONS!
1.Congratulations! (0:29)
5.First Project - ProcKiller - Walkthrough Part 2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock