دسته: TCM Security

Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers is the next step in YOUR penetration testing and ethical hacking journey.

Most engagements are conducted remotely, meaning that the tester must have the ability to move about freely from outside of the network into it. We do this using various techniques. Some of the simplest can be utilizing a compromised password to access a desktop environment via remote desktop and attempting to access other machines with those credentials. More complicated techniques include utilizing compromised endpoints to act as a proxy for us, forwarding traffic from internal targets back to our own.

ادامه مطلب

The Python 201 for Hackers course builds upon the Python 101 for Hackers course by moving beyond the basics. You will learn more advanced programming concepts and techniques, with a focus on how to use and apply Python as a Windows hacking tool.

Prior Python programming knowledge is required to be successful in this course. The Python 201 for Hackers course content will not cover or explain introductory Python concepts or techniques.

ادامه مطلب

The Python 101 for Hackers course teaches an introduction to Python programming and concepts, with a focus on techniques, modules and examples which are useful for a hacker. No prior Python programming knowledge is required to be successful in this introductory course.

ادامه مطلب