Special Halloween Offer

Save 20% on all courses by purchasing them now
watching now
2 Students

178 Lessons

Beginner

What You Will Learn?

  • By the end of the course you're going to have programming skills to write any program even if it has nothing to do with hacking, but you'll learn programming by programming hacking tools!
  • Linux terminal basics.
  • How networks work, and client communicate in a network.
  • How website work, GET & POST requests , Transferring data over TCP.
  • There is so much to learn.

Curriculum

23h 44m
Section 1: Introduction
1:28:46
Installing Kali 2019 as a virtual Machine
10:13
Basic Overview of Kali Linux
05:11
The Terminal & Linux Commands
11:21
Python 2 VS Python 3 & Writing Our First Program
09:08
Installing & Using a Python IDE
09:32
Installing Kali 2019 as a Virtual Machine [FIX]
02:01
Connect a USB Device to Kali
06:08
Best Wifi Adapters to Use With Kali
07:08
Section 2: Writing a MAC Address Changer - Python Basics
1:43:17
What is MAC Address & How To Change it
07:41
Using Python Modules & Executing System Commands
09:19
Implementing a Very Basic MAC Changer
05:17
Variables & Strings
10:13
Using Variables in MAC Changer
04:37
Getting Input From The User
06:19
Handling User Input
09:40
Handling Command-line Arguments
09:44
Initialising Variables Based on Command-line Arguments
07:51
Functions
09:41
Returning Values From Functions
06:56
Decision Making - Theory
06:54
Using Conditional Statements in MAC Changer
09:05
Section 3: MAC Changer - Algorithm Design
41:47
What is an Algorithm
03:15
Reading Output Returned By System Commands
06:25
Regular Expressions (Regex)
08:15
Extracting a Substring Using Regex
06:40
Refactoring & Housekeeping
11:00
Implementing The Algorithm to Check The Mac Did Change
06:12
Section 4: Programming a Network Scanner
1:48:35
Introduction & Teaser
10:11
Installing Windows as a Virtual Machine
03:32
What is ARP & What its Used For?
09:43
Designing an Algorithm To Discover Clients Connected To The Same Network
04:01
Using Scapy To Create an ARP Request
06:48
Combining Frames To Broadcast Packets
09:38
Sending & Receiving Packets
06:57
Lists
08:21
Iterating Over Lists & Analysing Packet
10:10
Using Escape Characters To Enhance Program Output
06:29
Dictionaries
09:37
Improving the Program Using a List of Dictionaries
08:55
Iterating Over Nested Data Structures
07:18
Python 3 Compatibility
06:55
Section 5: Writing a ARP Spoofer
1:17:44
What is ARP Spoofing?
06:21
Redirecting the Flow of Packets in a Network Using arpspoof
05:09
Creating an ARP Response
07:12
Sending ARP Responses
05:34
Extracting MAC Address From Responses
06:59
Loops
08:53
More on Loops & Counters
07:57
Dynamic Printing
06:55
Handling Exceptions
05:16
Implementing a Restore Function
11:55
Restoring ARP Tables When an Exception Occures
05:33
Section 6: Writing a Packet Sniffer
58:21
Introduction & Teaser
04:39
Sniffing Packets Using Scapy
07:20
Extracting data From a Specific Layer
06:50
Analysing Sniffed Packets & Extracting Fields From Layers
12:22
Analysing Fields & Extracting Passwords
11:06
Extracting URLs
08:01
Capturing Passwords From Any Computer Connected to the Same Network
08:03
Section 7: Writing a DNS Spoofer
57:48
Intercepting Packets - Creating a Proxy
13:01
Converting Packets to Scapy Packets
09:22
What is DNS Spoofing
07:20
Filtering DNS Responses
06:26
Analysing & Creating a Custom DNS Response
07:56
Modifying Packets On The Fly
07:58
Redirecting DNS Responses
05:45
Section 8: Writing a File Interceptor
50:18
Introduction & Teaser
04:28
Filtering Traffic Based on the Port Used
09:23
Analysing HTTP Requests
05:55
Intercepting HTTP Requests
10:19
Modifying HTTP Responses on The Fly
10:48
Intercepting & Replacing Downloads on The Network
09:25
Section 9: Writing a Code Injector
1:31:36
Introduction & Teaser
01:20
Analysing HTTP Responses
06:49
Replacing a Substring Using Regex
07:16
Decoding HTTP Responses
09:49
Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
08:50
Refactoring & Housekeeping
08:30
Debugging Issues
06:02
Using Groups & None-capturing Regex
08:57
Recalculating Content Length
11:39
BeEF Overview & Basic Hook Method
06:40
Hooking Computers Using code_injector
05:38
Basic BeEF Commands
04:24
Delivering Malware Using BeEF
05:42
Section 10: Bypassing HTTPS
38:26
How to Bypass HTTPS
10:49
Bypassing HTTPS & Sniffing Login Credentials
08:05
Replacing Downloads on HTTPS Pages
10:57
Injecting Code in HTTPS Pages
08:35
Section 11: Writing an ARP Spoof Detector
24:20
Running Python Programs on Windows
09:46
Capturing & Analysing ARP Responses
06:44
Detecting ARP Spoofing Attacks
07:50
Section 12: Writing Malware
1:28:07
Introduction & Teaser
01:58
Execute System Command Payload
09:41
Sending Reports By Email
11:26
Filtering Command Output Using Regex
10:07
Stealing WiFi Passwords Saved on a Computer
09:35
Downloading Files From Program
07:50
Writing Files on Disk
11:24
Password Recovery Basics
08:19
Using all the Above to Steal Saved Passwords Remotely
08:03
Interacting With The File System
09:44
Section 13: Writing Malware - Keylogger
1:15:01
Introduction & Teaser
03:42
Writing a Basic Local Keylogger
10:00
Global Variables
08:08
Logging Special Keys
06:58
Threading & Recursion
10:59
OOP - Object Oriented Programming Basics
15:08
Constructor Methods & Instance Variables
08:07
Logging Key-strikes and Reporting Them By Email
11:59
Section 14: Writing Malware - Backdoors
2:51:41
Introduction & Teaser
05:47
Client - Server Communication & Connection Types
07:46
Connecting Two Remote Computers Using Sockets
10:10
Sending & Receiving Data Over TCP
05:19
Executing System Commands Remotely
10:07
Implementing a Server
09:09
Implementing Skeleton For Server - Client Communication
06:59
Refactoring - Creating a Listener Class
08:13
Refactoring - Creating a Backdoor Class
06:24
Serialisation - Theory
11:14
Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP
07:56
Serialisation - Reliably Sending & Receiving Data
06:20
Sending Commands as List & Implementing Exit Command
08:16
Interacting With the File System - Implementing "cd" Command
09:25
Reading Files
07:31
Writing Files
06:53
Downloading Files From Hacked Computer
07:55
Implementing Upload Functionality in Listener
07:53
Implementing Upload Functionality in Backdoor
06:13
Handling Unknown Exceptions
09:38
Using the Backdoor to Hack Windows, Linux & OS X
12:33
Section 15: Writing Malware - Packaging
2:01:39
Introduction & Teaser
03:16
Converting Python Programs To Windows Binary Executables
07:13
Running Executables Silentely
07:23
Installing Windows Pyinstaller on Linux
07:43
Packaging Programs For Windows From Linux
08:34
Persistence Idea
08:15
Running Programs on Startup
14:43
Creating a Basic Trojan Using Download & Execute Payload
10:36
Creating a Trojan By Embedding Files In Program Code
08:34
Bypassing Anti-Virus Programs - Theory
05:23
Bypassing Anti-Virus Programs - Practical
09:05
Adding an Icon to Generated Executables
05:14
Spoofing File Extension
09:35
Converting Python Programs To OS X Executables
08:41
Converting Python Programs to Linux Executables
07:24
Section 16: Website / Web Application Hacking
16:27
Introduction & Teaser
06:42
What is a Website
04:14
How to Hack a Website
05:31
Section 17: Website Hacking - Writing a Crawler
1:09:45
Sending GET Requests To Web Servers
10:01
Discovering Subdomains
11:44
Discovering Hidden Paths in Websites
10:55
Reading Response Content
06:27
Extracting Useful Data From Response
07:09
Filtering Results
07:10
Extracting Unique Links & Storing Them In a List
06:42
Recursively Discovering All Paths On a Target Website
09:37
Section 18: Writing a Program To Guess Login Information
21:06
Sending Post Requests to Websites
12:00
Guessing Login Information on Login Pages
09:06
Section 19: Writing a Vulnerability Scanner
2:00:06
Introduction & Teaser
02:35
HTTP Requests - POST VS GET
07:06
Parsing HTML Code
08:19
Extracting HTML Attributes
10:31
Posting Forms
10:27
Building Basic Structure For Vulnerability Scanner
11:25
Using Default Parameters
05:09
Sending Requests in a Session
09:16
Extracting & Submitting Forms Automatically
10:07
Implementing a Method To Run The Scanner
06:09
Discovering XSS Vulnerabilities
09:07
Exploiting XSS Vulnerabilities
05:09
Implementing Code To Discover XSS in Forms
08:16
Implementing Code To Discover XSS in Parameters
07:44
Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
08:46

Description

Requirements

  • Basic IT knowledge
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux

About the Instructor

100% of students rated this instructor as excellent!
Reviews 0
Students 5
Courses 3

My name is Zaid, I am an ethical hacker, a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.

BitDegree platform reviews

Our students say Excellent
9.5 out of 10
trustpilot logo 1 trustpilot logo