Mô tả

Python is one of the most used programming language in the world and its significance can't be ignored. Python has gained immense popularity recently owing to its performance in various fields like machine learning, data science, data analytics and cyber security. This course is designed in python to make ethical hacking easier for students since python is one of the most easy programming languages to learn. The concepts used in this course are fairly simple and anyone with some knowledge of computer science can try this course.

In this course we will learn following topics:

  1. Introduction to basics of computer networks

  2. What is hacking

  3. How to stay anonymous

  4. Learn how to track IP location

  5. Create your own undetectable malware

  6. Execute system commands on the victim machine using backdoor

  7. Download and upload files to victim machine

  8. How to create a Trojan

  9. How to steal wifi passwords stored on the PC

  10. How to intercept, manipulate and craft network packets

  11. How to perform man in the middle attack

  12. Crack password protected zipped files

  13. Build your own undetectable key logger

  14. Create a botnet with a command and control center

  15. How to protect yourself online

Bạn sẽ học được gì

Introduction to basics of computer networks

What is hacking

How to stay anonymous

Learn how to track IP location

Create your own undetectable malware

Execute system commands on the victim machine using backdoor

Download and upload files to victim machine

How to create a Trojan

How to steal wifi passwords stored on the PC

How to intercept, manipulate and craft network packets

How to perform man in the middle attack

Crack password protected zipped files

Build your own undetectable key logger

Create a botnet with a command and control center

How to protect yourself online

Yêu cầu

  • You should have familiarity with basics of python
  • Basic understanding of computer networking
  • A working computer

Nội dung khoá học

23 sections

Introduction

1 lectures
What this course covers
03:09

Getting Started

12 lectures
Virtual machines
00:38
Operating Systems
03:08
Installing python part 1
02:33
Announcement
00:21
Source Code
00:00
Installing python part 2
01:09
Integrated Development Environments [IDEs] to use
01:43
Virtual environment
02:58
Virtual environment linux
05:40
virtual environment windows
01:14
virtual environment windows part 2
01:29
visual studio code configuration
06:49

Networking Introduction

4 lectures
Network Classification
12:33
Local Area Network types
05:22
OSI stack
09:17
Common networking terminologies
10:08

Introduction to hacking

1 lectures
What is Hacking
13:16

Staying anonymous

5 lectures
How to change MAC address
01:49
Creating MAC changer Class
06:46
Regex pattern
04:54
completing MAC function
04:01
Running the program
07:05

Geo Tracking

2 lectures
How HTTP protocol works
05:56
How to track IP location
08:26

Packet manipulation - Introduction to scapy module

3 lectures
Introduction to networking layers TCP / IP/ ETHER
05:53
Scapy introduction
10:40
Working with scapy
04:18

Network scanning

4 lectures
Network Mapper Introduction - NMAP
10:54
Creating scapy scanner
05:43
Scanning network using scapy
04:42
Sending packets
06:58

Creating your own malware

16 lectures
Create a server program
08:02
Create a client program
08:09
Create server class
05:36
Listen and accept connections
02:20
Sending and receiving data
03:03
Create client class
00:55
Creating instances for server and client
05:45
Handling the connection
11:36
Getting user input
04:11
Creating command obj
03:41
Getting user command
03:00
Execute system command
02:14
Executing command windows
04:59
Handling empty command
03:05
Adding delimeter
04:10
Receive command result back
09:18

Malware - upload viruses and files to victim

7 lectures
Introduction how to send file
02:29
Getting files on server
09:03
Send file
03:56
Receiving file handler
03:22
Receiving file on victim
04:28
Running the program
02:42
Encrypting viruses
02:08

Downloading folder from victim

10 lectures
Introduction how to send files to hacker
04:34
Creating handler
01:32
Sending list of files to hacker
06:01
Receiving list and selecting files to send
04:49
Selecting file
02:29
Creating zip
04:04
Creating zip part 2
07:50
Send zipped files to hacker
04:58
Receiving Zipped files
05:18
Running the program
03:40

Malware - File system navigation

4 lectures
Navigation handler
02:50
Sending initial current directory to Hacker
06:08
continued
04:11
Running the program
01:18

Capturing Screenshot

3 lectures
Creating handler
01:19
Capturing Screenshot
04:59
Run the screenshot program
01:55

Malware - persistence

5 lectures
Persistence handler
02:37
Copy executable to appadata
08:06
Modifying key value
07:59
Creating executable and editing registry
02:40
Testing the program
00:54

Malware - creating a trojan

5 lectures
installing pyinstaller
03:26
creating executable with no console
05:16
Adding icon to executable
02:11
Creating trojan using winrar
06:32
Attack over public ip
03:27

WIFI - Steal passwords

4 lectures
Stealing wifi passwords
02:38
Stealing wifi passwords continued
04:00
Getting access point names
03:55
Testing the program
04:29

Man in the Middle Attack - MITM with ARP

13 lectures
Introduction to Address Resolution Protocol
06:47
ARP spoofing
06:52
Installing ARP spoof linux
01:59
Enable IP forwarding
02:18
MITM attack over ARP
05:05
Capturing Packets
05:24
ARP spoof victim
11:52
ARP spoof with function
07:19
ARP spoofing loop
03:00
Restoring ARP tables
03:11
Performing Man in the Middle attack
04:33
Testing the program
05:17
Adding command line arguments
04:21

Decrypting packets using SSL strip

3 lectures
Introduction to SSL strip
10:48
Installing SSL strip linux
03:17
Removing encryption
06:41

Archieve Cracker - cracking passwords using dictionary attack

6 lectures
Introduction to password cracking
03:50
Parsing options
03:41
Reading password file
05:27
Creating extract zip method
03:15
Testing the program
02:20
Creating executable
05:10

Keylogger - Spying tool

5 lectures
Introduction to keyloggers
07:03
Writing keystrokes to a file
06:03
Removing quotes
01:53
Modifying program to add space key
04:04
Adding backspace functionality
04:07

Botnet - Command and Control - Control multiple clients

4 lectures
Introduction to botnets
01:12
Creating bots
05:01
CnC and bots
07:21
Testing the program
02:59

Cryptography

4 lectures
Introduction to cryptography
02:45
String encryption
07:37
Encrypt file
08:35
Decrypt file
05:17

Protection

1 lectures
Protecting yourself from hackers
08:15

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.