Video Description

An Activity in Post Exploitation Hacking This lesson offers participants an activity in post-exploitation hacking. Post exploitation is not necessary component of Python, however it is a valuable skill worth knowing. Participants will learn how to write a script that is used in the post-exploitation hacking phase, which is a handy tool for pen testers. Participants will learn how to: - Gather information from a host machine and send it to a target server

  • Use sub processes to create a use and delete a user

  • Download registry keys

Sub processes are very useful to know as it allows you to do multiprocessing, it lets you call another executable from within Python. This lab-based lesson offers participants step by step instructions in creating a Python script which can be used at the post-exploitation hacking stage.

Course Modules