🎁 Airdrop Season 7 is LIVE - Answer Fun Questions to Earn $30K Prize Pool Rewards. JOIN NOW!
watching now
4 Students

Description

What Will You Learn?

  • Installation processes of VirtualBox and Kali Linux
  • Types of attacks for testing security measures and finding bugs with Python

Requirements

  • Basic understanding of Python
  • VirtualBox and Kali Linux
  • NFT Certificate
  • 89 Lessons
  • Beginner
  • English
  • 5.0 Rating
  • +100 XP

Share Course on Social media

Curriculum

Course consist of total 17h 25min of content, in total.

Section 1: Introduction to Python for ethical hacking!
1:02:48
Section 2: Port and vulnerability scanning
1:43:09
Making simple port scanner
15:33
Adding raw_input to our port scanner
09:24
Scanning first 1000 ports
04:47
Coding advance port scanner - part 1
13:13
Coding advance port scanner - part 2
08:52
Finishing and testing advance port scanner
09:01
Configuring IP address and installing Metasploitable
08:15
Returning banner from open port
14:46
Coding vulnerability scanner - part 1
11:57
Coding vulnerability scanner - part 2
07:21
Section 3: SSH & FTP attacks
1:16:13
Automating SSH login - part 1
09:56
Automating SSH login - part 2
09:21
Testing SSH login program
08:38
Coding SSH Bruteforcer
10:39
Executing command on target after brute forcing SSH
10:11
Anonymous FTP login attack
09:55
Username & password list attack on FTP
17:33
Section 4: Password cracking
1:02:48
SHA256, SHA512 and MD5
08:38
Cracking SHA1 hash with online dictionary
16:41
Getting password from MD5 hash
13:26
Cracking crypt password with Salt
24:03
Section 5: Sniffers, flooders, and spoofers
2:34:07
Changing MAC address manually
08:35
Coding MAC changer
17:01
Theory behind ARP spoofing
04:43
Crafting malicious ARP packet
19:28
Coding ARP spoofer
13:34
Forwarding packets and restoring ARP tables
08:07
Spoofing our IP address and sending message with TCP payload
12:03
Running SynFlooder with changed source IP address
11:22
Getting source and destination MAC address from received packets
24:46
Sniffing FTP username and password - part 1
08:12
Sniffing FTP username and password - part 2
12:12
Getting passwords from HTTP websites
14:04
Section 6: Coding DNS spoofer
48:06
Cloning any webpage
10:37
Printing DNS queries
10:01
Redirecting response to cloned page
16:48
Setting IP table rules and running DNS spoofer
10:40
Section 7: Network analysis
1:20:51
Analyzing Ethernet header
16:10
Analyzing IP header - part 1
10:28
Analyzing IP header - part 2
25:36
Analyzing TCP header
15:16
Analyzing UDP header
13:21
Section 8: Multi functioning reverse shell
3:14:57
Theory behind socket programming
07:21
Wine & Pyinstaller installation
07:45
Setting up listener
08:20
Establishing connection between target and server
06:33
Implementing send & recv functions
11:30
Executing commands on target system
11:45
Importing JSON library to parse data
08:21
Converting Python backdoor to .exe
08:15
Using OS library to change directory
10:01
Downloading & uploading files to target PC
19:08
Hiding our backdoor and creating persistence
13:50
Trying to connect to server every 20 seconds
07:55
Downloading files to target PC
11:52
Capturing screenshot on target PC
23:08
Administrator privilege check
08:16
Starting other programs with our shell
10:47
Running our shell as an image, audio, Pdf...
20:10
Section 9: Coding keylogger
38:09
Installing Pynput
06:21
Printing space character
08:50
Calling timer on our keylogger
09:58
Adding keylogger to our backdoor
13:00
Section 10: Command and control center
1:17:45
What is a threaded server
05:07
Accepting connections with a thread
13:14
Managing multiple sessions
08:41
Testing threaded server with Windows 10 target
09:06
Fixing Q command
11:14
Coding exit function
13:54
Attacking multiple targets and gathering botnet
16:29
Section 11: Website penetration testing with Python
2:26:09
Stealing saved wireless passwords
22:00
Saving passwords to a file
03:03
Bruteforcing Gmail
10:15
Bruteforcing any login page - part 1
13:02
Bruteforcing any login page - part 2
10:11
Finding hidden directories - part 1
05:12
Finding hidden directories - part 2
06:40
Discovering subdomains
11:33
Changing HTTP headers
14:00
Starting basic and digest authentication bruteforcer
10:25
Controlling threads
08:37
Coding run function
10:10
Printing usage and testing our program
12:39
Taking a look at ransomware
08:22

About the Instructor

90.4% of students rated this instructor as excellent!

See All Instructor Courses

BitDegree platform reviews