Offensive C#
Offensive C#, available at $27.99, has an average rating of 4.3, with 63 lectures, based on 92 reviews, and has 4522 subscribers.
You will learn about Learn C# Basics Learn how to build tools with C# Learn how to enumerate Active Directory using C# Automate tasks using C# Learn some Powershell tools Learn WinAPI with C# Enumerate LSASS using WinAPI Learn PE File Format Writing Reflective PE Loader Writing Reflective DLL Loader This course is ideal for individuals who are Penetration Testers or Red Teamers or System Administrators or Windows Enthusiasists or Security Researchers It is particularly useful for Penetration Testers or Red Teamers or System Administrators or Windows Enthusiasists or Security Researchers.
Enroll now: Offensive C#
Summary
Title: Offensive C#
Price: $27.99
Average Rating: 4.3
Number of Lectures: 63
Number of Published Lectures: 63
Number of Curriculum Items: 63
Number of Published Curriculum Objects: 63
Original Price: ₹1,299
Quality Status: approved
Status: Live
What You Will Learn
- Learn C# Basics
- Learn how to build tools with C#
- Learn how to enumerate Active Directory using C#
- Automate tasks using C#
- Learn some Powershell tools
- Learn WinAPI with C#
- Enumerate LSASS using WinAPI
- Learn PE File Format
- Writing Reflective PE Loader
- Writing Reflective DLL Loader
Who Should Attend
- Penetration Testers
- Red Teamers
- System Administrators
- Windows Enthusiasists
- Security Researchers
Target Audiences
- Penetration Testers
- Red Teamers
- System Administrators
- Windows Enthusiasists
- Security Researchers
This course teaches you all the way from fundamentals of C# to invoke WinAPI with C#. C# is Microsoft developed language which can be used for multiple purposes. C# gives almost all access to windows components including WinAPI via PInvoke. This course also teaches how to build your own C2 Server with Python Flask as backend and C2 agent. Features include Client connection manager, File explorer, Registry Explorer, etc. More features of C2 will be added from time to time. We will see how to code a traditional reverse shell with C2 which by default bypasses Constrained Language Mode. Next we will see some privilege escalation techniques. Next we will enumerate Active Directory with C# and build our own automation tools. We will write tools that automate Kerberoasting, DCSync capable users, Delegation Attacks and much more. We will write a simple loader that loads .NET executables in memory and executes them. Next we will see how to use WinAPI functions in C# and write tools for Shellcode Injection, DLL Injection, Debugging checks, Backdooring of PE Files and much more. We will also see the structure of PE File format.
No programming or Activedirectory experience required.
This course explains all the theory necessary to get started into building your own tools.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Chapter 2: C# Basics
Lecture 1: Environment Setup and Hello World
Lecture 2: Variables and Operators
Lecture 3: Reading User Input
Lecture 4: Loops
Lecture 5: Arrays
Lecture 6: Functions
Chapter 3: Python C2 Server
Lecture 1: Sockets and Multithreading
Lecture 2: Flask basics
Lecture 3: Linking Sockets and web interface
Lecture 4: Bidirectional File Transfer
Lecture 5: Multithreaded keylogger
Chapter 4: C# Reverse Shell
Lecture 1: Coding a reverse shell in C#
Chapter 5: LDAP Enumeration
Lecture 1: LDAP Enumeration with ldapsearch
Chapter 6: Privilege Escalation
Lecture 1: Finding Unquoted Service paths
Lecture 2: Finding Writable Files
Chapter 7: Automating Active Directory Enumeration
Lecture 1: Finding ASREP Roastable users
Lecture 2: Finding Nested groups
Lecture 3: Finding DCSync capable users
Lecture 4: Finding Unconstrained Delegation users
Lecture 5: Kerberos Constrained Delegation Attack
Lecture 6: Resource based Constrained Delegation
Chapter 8: .NET Loader
Lecture 1: Simple .NET Loader
Chapter 9: Persistence
Lecture 1: AdminSDHolder Persistence via C#
Chapter 10: WinAPI with C#
Lecture 1: MessageBoxW and GetUserNameW
Lecture 2: Structures and Unions
Lecture 3: NetShareEnumW – Enumerating network shares
Lecture 4: GetTokenInformation – Checking our elevation privilege
Lecture 5: Listing All token privileges
Lecture 6: Enabling all assigned token privileges – AdjustTokenPrivilege
Lecture 7: Simple Shellcode runner
Lecture 8: Shellcode Injection in remote process
Lecture 9: Storing shellcode in .rsrc resources section
Lecture 10: DLL Injection
Lecture 11: Finding DLLs and their Base addresses in a process
Lecture 12: Checking if Process is attached to debugger or not
Lecture 13: Detaching the debugger from process using NtRemoveProcessDebug
Lecture 14: Backdooring PE Files
Lecture 15: Getting Screenshots
Lecture 16: Obfuscating Function names using Delegates
Chapter 11: LSA API
Lecture 1: Enumerating Logon Sessions
Chapter 12: PE File Format
Lecture 1: DOS Header, DOS Stub, Signature, File Header
Lecture 2: Optional Header
Lecture 3: Section Headers
Lecture 4: Import Name Table and Import Address Table
Lecture 5: Parsing Exports in a DLL
Chapter 13: Reflective PE64 Injection
Lecture 1: Parsing Headers
Lecture 2: Mapping sections into memory
Lecture 3: Fixing Import Address Table
Lecture 4: Fixing Base Relocations
Lecture 5: Testing Metasploit payloads
Lecture 6: Adding a New Section via C#
Chapter 14: Process Hollowing
Lecture 1: Process Hollowing
Chapter 15: DLL Injection via SetWindowsHookExA
Lecture 1: SetWindowsHookExA DLL Injection
Chapter 16: Shellcode Injection via Mapping Sections
Lecture 1: Shellcode Injection via NtMapViewofSection
Lecture 2: DLL Hollowing
Chapter 17: Thread Queue APC Injections
Lecture 1: QueueUserAPC Code Injection
Chapter 18: Evasion Techniques
Lecture 1: Obfuscating Imports
Chapter 19: AMSI Bypassing techniques
Lecture 1: Patching AmsiScanBuffer in memory
Chapter 20: API Hooking
Lecture 1: Simple Function Hooking
Lecture 2: Local Function Hooking with EasyHook
Chapter 21: API Hashing
Lecture 1: Hashing the function names to avoid static analysis
Chapter 22: Walkthroughs
Lecture 1: Hackthebox – SAUNA
Instructors
-
Naga Sai Nikhil
Computer Science Engineer and Infosec guy
Rating Distribution
- 1 stars: 2 votes
- 2 stars: 3 votes
- 3 stars: 9 votes
- 4 stars: 34 votes
- 5 stars: 44 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024