Chevron Left
Back to Establishing Command-and-Control and Finding Credentials

Learner Reviews & Feedback for Establishing Command-and-Control and Finding Credentials by Infosec

4.6
stars
25 ratings

About the Course

This course demonstrates the use of Python to establish command-and-control channels between a target environment and the attackers infrastructure. This course also demonstrates the use of Python to collect information on a system, including both user credentials and other sensitive data....

Top reviews

Filter by:

1 - 7 of 7 Reviews for Establishing Command-and-Control and Finding Credentials

By Robenus B

•

Apr 14, 2025

It is a nice explanation of the concept and the code, but I would prefer more hands-on work along with the lessons. Thank you Sir!

By Aaron S

•

Apr 3, 2023

Awesome Course to Learn from

By Joseph M

•

Aug 29, 2022

Excellent delivery.

By Syed M

•

Feb 17, 2025

Great!!!

By Ian L

•

Jan 19, 2024

A great addition would be having access to the scripts (maybe through Git) and having a test file as the case study (fake passwd, Usrname, ip, etc). Also, some feed back to the discussions. It seems like Infosec has abandoned their courses.

By Eduard R

•

Feb 25, 2025

Speaks rather slowly. There is no link to sources, I had to search on the forum, where none of the organizers answered either. There are no practical tasks, mostly just analysis of ready-made code. The tests have rather strange questions that are not clear how to answer. There is very little information for specialization, all courses could have been combined into one course.

By Hector J

•

Oct 12, 2023

the person presenting the videos does a good job explaining everything, but it lacks notes to better grasp the idea at a later time. It would also help if they provided the link to the code repository. Or even better if the code in the video had comments inside the code to be able to understand it at a later time.