Mô tả

If you would like to master ethical hacking while working on practical Python coding projects, you are going to LOVE this course! Learn Python hacking, ethical hacking, penetration testing, cybersecurity, and more with over 17 hours of HD video tutorials! This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. We will begin with coding basic port and vulnerability scanning tools, move onto SSH, FTP, and spoofing attacks, take a look at network analysis, and finish up with coding a reverse shell, command and control center, and several website penetration testing tools. Upon completing this course, you will be prepared for a job in the cybersecurity industry.


8 Coding Projects in the course:

• Port and vulnerability scanner

• SSH brute-forcer

• MAC address changer

• ARP spoofer

• DNS spoofer

• Multi-functioning reverse shell

• Keylogger

• Command and control center


Topics covered in the course:

• Introduction and setup

• Port and vulnerability scanning

• SSH and FTP attacks

• Password cracking

• Sniffers, flooders and spoofers

• DNS spoofing

• Network analysis

• Coding a multi-functioning reverse shell

• Keyloggers

• Command and control center

• Website penetration testing


Still not sold? Check out a few of the awesome reviews this course has received from customers:

• "This course was very helpful to me. It taught me to actually continue coding. I used to try to learn using tutorials but I would lose interest quickly. This course has me writing code over and over to get the feel of the syntax and gives me a better understanding of how coding actually works. Thanks!"

• "What a great course!! It helped to give me a deep understanding of many topics about my current CEH Certification. Thank you very much!"

• "The course is very well explained, projects are being developed and showing how they can be improved. I particularly liked the section dedicated to the reverse shell, I learned a lot. Thank you Joseph for the course."


Bạn sẽ học được gì

Yêu cầu

Nội dung khoá học

11 sections

Introduction and Setup

6 lectures
Welcome to Python for ethical hacking!
05:16
Kali Linux in a virtual machine quick start guide
01:42
VirtualBox installation
11:39
Kali Linux installation
17:05
Adding Guest Additions
15:06
Python in Kali terminal
13:31

Port and Vulnerability Scanning

10 lectures
Coding a simple port scanner
15:30
Adding raw_input to our port scanner
09:21
Scanning the first 1,000 ports
04:46
Coding an advanced port scanner part 1
13:12
Coding an advanced port scanner part 2
08:48
Finishing and testing our scanner
08:55
Configuring IP address and installing Metasploitable
08:13
Returning banner from open port
14:45
Coding a vulnerability scanner part 1
11:55
Coding a vulnerability scanner part 2
07:19

SSH and FTP Attacks

7 lectures
Automating SSH login part 1
09:54
Automating SSH login part 2
09:20
Testing our SSH login program
08:34
Coding a SSH brute-forcer
10:37
Executing commands on target after brute-forcing SSH
10:09
Anonymous FTP login attack
09:53
Username & password list attack on FTP
17:32

Password Cracking

4 lectures
SHA256, SHA512, MD5
08:36
Cracking SHA1 hash with online dictionary
16:40
Getting password from MD5 hash
13:22
Cracking crypt passwords with salt
24:02

Sniffers, Flooders and Spoofers

12 lectures
Changing MAC address manually
08:34
Coding MAC address changer
16:56
Theory behind ARP spoofing
04:42
Crafting malicious ARP packet
19:26
Coding ARP spoofer
13:31
Forwarding packets and restoring ARP tables
08:04
Spoofing our IP address and sending message with TCP payload
12:01
Running SynFlooder with changed source IP address
11:20
Getting source and destination MAC address from received packets
24:45
Sniffing FTP username and password part 1
08:09
Sniffing FTP username and password part 2
12:09
Getting passwords from HTTP websites
14:01

Coding DNS Spoofer

4 lectures
Cloning any webpage
10:36
Printing DNS queries
09:57
Redirecting response to cloned page
16:44
Setting IP table rules and running DNS spoofer
10:35

Network Analysis

5 lectures
Analyzing Ethernet header
16:07
Analyzing IP header part 1
10:24
Analyzing IP header part 2
25:34
Analyzing TCP header
15:13
Analyzing UDP header
13:20

Multi-functioning Reverse Shell

17 lectures
Theory behind socket programming
07:20
Wine and Pyinstaller installation
07:41
Setting up listener
08:17
Establishing connection between target and server
06:31
Implementing send & receive functions
11:28
Executing commands on target system
11:43
Importing JSON library to parse data
08:19
Converting Python backdoor to .exe
08:14
Using OS library to change directory
09:58
Downloading & uploading files to target PC
19:07
Hiding our backdoor and creating persistence
13:49
Trying to connect to server every 20 seconds
07:52
Downloading files to target PC
11:49
Capturing screenshot on target PC
23:04
Administrator privilege check
08:14
Starting other programs with our shell
10:44
Running our shell as an image, audio, PDF
20:05

Coding a Keylogger

4 lectures
Installing Pynput
06:19
Printing space character
08:48
Calling timer on our keylogger
09:56
Adding a keylogger to our backdoor
12:58

Command and Control Center

7 lectures
What is a threaded server?
05:05
Accepting connections with a thread
13:11
Managing multiple sessions
08:39
Testing threaded server with Windows 10 target
09:04
Fixing Q command
11:11
Coding exit function
13:51
Attacking multiple targets and gathering botnet
16:26

Website Penetration Testing

14 lectures
Stealing saved wireless passwords
21:55
Saving passwords to a file
03:02
Bruteforcing Gmail
10:13
Bruteforcing any login page part 1
12:59
Bruteforcing any login page part 2
10:07
Finding hidden directories part 1
05:10
Finding hidden directories part 2
06:36
Discovering subdomains
11:32
Changing HTTP headers
13:55
Starting basic and digest authentication bruteforcer
10:23
Controlling threads
08:35
Coding run function
10:06
Printing usage and testing our program
12:33
Taking a look at ransomware
08:19

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.