Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hacking the Windows API with Python - Real Ethical Hacking
1.INTRODUCTION
1.Introduction (0:45)
2.SETTING UP
1.Setting Up Your Professional Portfolio (4:33)
2.Installing Python & Tools on Windows (5:34)
3.WINDOWS API OVERVIEW
1.Windows Internals (6:54)
2.The Windows API Call (10:59)
4.THE API BASICS & HOOKING INTO A WINDOWS PROCESS
1.Hello World Windows API Style (14:02)
2.Gaining a Handle to a Windows Process (14:36)
3.First Project - ProcKiller (2:43)
4.First Project - ProcKiller - Walkthrough Part 1 (10:14)
5.First Project - ProcKiller - Walkthrough Part 2 (10:18)
5.MORE ADVANCED WINDOWS API CALLS
1.Windows Internal Structures (8:42)
2.Spawning a Process (13:39)
3.Undocumented API Calls (10:49)
6.ABUSING WINDOWS TOKENS
1.What are Token Privileges (3:35)
2.Opening a Processes Access Token (8:00)
3.Checking a Processes Token Privileges (17:54)
4.Modifying a Processes Token Privileges (12:09)
5.Second Project - Impersonation Tool (2:47)
6.Second Project - Impersonation Tool Walkthrough (9:46)
7.COMPILING PYTHON TO PE_EXE
1.Compiling Python to an EXE (2:27)
8.CONGRATULATIONS!
1.Congratulations! (0:29)
Teach online with
1.Windows Internal Structures
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock