HOME > IT & Software > Offensive C#

Offensive C#

SynopsisOffensive C#, available at $27.99, has an average rating of 4...
Offensive C#  No.1

Offensive C#, available at $27.99, has an average rating of 4.3, with 63 lectures, based on 92 reviews, and has 4522 subscribers.

You will learn about Learn C# Basics Learn how to build tools with C# Learn how to enumerate Active Directory using C# Automate tasks using C# Learn some Powershell tools Learn WinAPI with C# Enumerate LSASS using WinAPI Learn PE File Format Writing Reflective PE Loader Writing Reflective DLL Loader This course is ideal for individuals who are Penetration Testers or Red Teamers or System Administrators or Windows Enthusiasists or Security Researchers It is particularly useful for Penetration Testers or Red Teamers or System Administrators or Windows Enthusiasists or Security Researchers.

Enroll now: Offensive C#

Summary

Title: Offensive C#

Price: $27.99

Average Rating: 4.3

Number of Lectures: 63

Number of Published Lectures: 63

Number of Curriculum Items: 63

Number of Published Curriculum Objects: 63

Original Price: ?1,299

Quality Status: approved

Status: Live

What You Will Learn

  • Learn C# Basics
  • Learn how to build tools with C#
  • Learn how to enumerate Active Directory using C#
  • Automate tasks using C#
  • Learn some Powershell tools
  • Learn WinAPI with C#
  • Enumerate LSASS using WinAPI
  • Learn PE File Format
  • Writing Reflective PE Loader
  • Writing Reflective DLL Loader
  • Who Should Attend

  • Penetration Testers
  • Red Teamers
  • System Administrators
  • Windows Enthusiasists
  • Security Researchers
  • Target Audiences

  • Penetration Testers
  • Red Teamers
  • System Administrators
  • Windows Enthusiasists
  • Security Researchers
  • This course teaches you all the way from fundamentals of C# to invoke WinAPI with  C#. C# is Microsoft developed language which can be used for multiple purposes. C# gives almost all access to windows components including WinAPI via PInvoke. This course also teaches how to build your own C2 Server with Python Flask as backend and C2 agent. Features include Client connection manager, File explorer, Registry Explorer, etc. More features of C2 will be added from time to time. We will see how to code a traditional reverse shell with C2 which by default bypasses Constrained Language Mode. Next we will see some privilege escalation techniques. Next we will enumerate Active Directory with C# and build our own automation tools. We will write tools that automate Kerberoasting, DCSync capable users, Delegation Attacks and much more. We will write a simple loader that loads .NET executables in memory and executes them. Next we will see how to use WinAPI functions in C# and write tools for Shellcode Injection, DLL Injection, Debugging checks, Backdooring of PE Files and much more. We will also see the structure of PE File format.

    No programming or Activedirectory experience required.

    This course explains all the theory necessary to get started into building your own tools.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Chapter 2: C# Basics

    Lecture 1: Environment Setup and Hello World

    Lecture 2: Variables and Operators

    Lecture 3: Reading User Input

    Lecture 4: Loops

    Lecture 5: Arrays

    Lecture 6: Functions

    Chapter 3: Python C2 Server

    Lecture 1: Sockets and Multithreading

    Lecture 2: Flask basics

    Lecture 3: Linking Sockets and web interface

    Lecture 4: Bidirectional File Transfer

    Lecture 5: Multithreaded keylogger

    Chapter 4: C# Reverse Shell

    Lecture 1: Coding a reverse shell in C#

    Chapter 5: LDAP Enumeration

    Lecture 1: LDAP Enumeration with ldapsearch

    Chapter 6: Privilege Escalation

    Lecture 1: Finding Unquoted Service paths

    Lecture 2: Finding Writable Files

    Chapter 7: Automating Active Directory Enumeration

    Lecture 1: Finding ASREP Roastable users

    Lecture 2: Finding Nested groups

    Lecture 3: Finding DCSync capable users

    Lecture 4: Finding Unconstrained Delegation users

    Lecture 5: Kerberos Constrained Delegation Attack

    Lecture 6: Resource based Constrained Delegation

    Chapter 8: .NET Loader

    Lecture 1: Simple .NET Loader

    Chapter 9: Persistence

    Lecture 1: AdminSDHolder Persistence via C#

    Chapter 10: WinAPI with C#

    Lecture 1: MessageBoxW and GetUserNameW

    Lecture 2: Structures and Unions

    Lecture 3: NetShareEnumW – Enumerating network shares

    Lecture 4: GetTokenInformation – Checking our elevation privilege

    Lecture 5: Listing All token privileges

    Lecture 6: Enabling all assigned token privileges – AdjustTokenPrivilege

    Lecture 7: Simple Shellcode runner

    Lecture 8: Shellcode Injection in remote process

    Lecture 9: Storing shellcode in .rsrc resources section

    Lecture 10: DLL Injection

    Lecture 11: Finding DLLs and their Base addresses in a process

    Lecture 12: Checking if Process is attached to debugger or not

    Lecture 13: Detaching the debugger from process using NtRemoveProcessDebug

    Lecture 14: Backdooring PE Files

    Lecture 15: Getting Screenshots

    Lecture 16: Obfuscating Function names using Delegates

    Chapter 11: LSA API

    Lecture 1: Enumerating Logon Sessions

    Chapter 12: PE File Format

    Lecture 1: DOS Header, DOS Stub, Signature, File Header

    Lecture 2: Optional Header

    Lecture 3: Section Headers

    Lecture 4: Import Name Table and Import Address Table

    Lecture 5: Parsing Exports in a DLL

    Chapter 13: Reflective PE64 Injection

    Lecture 1: Parsing Headers

    Lecture 2: Mapping sections into memory

    Lecture 3: Fixing Import Address Table

    Lecture 4: Fixing Base Relocations

    Lecture 5: Testing Metasploit payloads

    Lecture 6: Adding a New Section via C#

    Chapter 14: Process Hollowing

    Lecture 1: Process Hollowing

    Chapter 15: DLL Injection via SetWindowsHookExA

    Lecture 1: SetWindowsHookExA DLL Injection

    Chapter 16: Shellcode Injection via Mapping Sections

    Lecture 1: Shellcode Injection via NtMapViewofSection

    Lecture 2: DLL Hollowing

    Chapter 17: Thread Queue APC Injections

    Lecture 1: QueueUserAPC Code Injection

    Chapter 18: Evasion Techniques

    Lecture 1: Obfuscating Imports

    Chapter 19: AMSI Bypassing techniques

    Lecture 1: Patching AmsiScanBuffer in memory

    Chapter 20: API Hooking

    Lecture 1: Simple Function Hooking

    Lecture 2: Local Function Hooking with EasyHook

    Chapter 21: API Hashing

    Lecture 1: Hashing the function names to avoid static analysis

    Chapter 22: Walkthroughs

    Lecture 1: Hackthebox – SAUNA

    Instructors

  • Offensive C#  No.2
    Naga Sai Nikhil
    Computer Science Engineer and Infosec guy
  • Rating Distribution

  • 1 stars: 2 votes
  • 2 stars: 3 votes
  • 3 stars: 9 votes
  • 4 stars: 34 votes
  • 5 stars: 44 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!