🔥$100K Hit! Where Will Bitcoin Go Next? Find Out Live!
watching now
5 Students

Description

What Will You Learn?

  • Installation processes of VirtualBox and Kali Linux
  • Types of attacks for testing security measures and finding bugs with Python

Requirements

  • Basic understanding of Python
  • VirtualBox and Kali Linux
  • NFT Certificate
  • 89 Lessons
  • Beginner
  • English
  • 5.0 Rating
  • +100 XP

Share Course on Social media

Curriculum

Course consist of total 17h 25min of content, in total.

Section 1: Introduction to Python for ethical hacking!
1:02:48
Section 2: Port and vulnerability scanning
1:43:09
Making simple port scanner
15:33
Adding raw_input to our port scanner
09:24
Scanning first 1000 ports
04:47
Coding advance port scanner - part 1
13:13
Coding advance port scanner - part 2
08:52
Finishing and testing advance port scanner
09:01
Configuring IP address and installing Metasploitable
08:15
Returning banner from open port
14:46
Coding vulnerability scanner - part 1
11:57
Coding vulnerability scanner - part 2
07:21
Section 3: SSH & FTP attacks
1:16:13
Automating SSH login - part 1
09:56
Automating SSH login - part 2
09:21
Testing SSH login program
08:38
Coding SSH Bruteforcer
10:39
Executing command on target after brute forcing SSH
10:11
Anonymous FTP login attack
09:55
Username & password list attack on FTP
17:33
Section 4: Password cracking
1:02:48
SHA256, SHA512 and MD5
08:38
Cracking SHA1 hash with online dictionary
16:41
Getting password from MD5 hash
13:26
Cracking crypt password with Salt
24:03
Section 5: Sniffers, flooders, and spoofers
2:34:07
Changing MAC address manually
08:35
Coding MAC changer
17:01
Theory behind ARP spoofing
04:43
Crafting malicious ARP packet
19:28
Coding ARP spoofer
13:34
Forwarding packets and restoring ARP tables
08:07
Spoofing our IP address and sending message with TCP payload
12:03
Running SynFlooder with changed source IP address
11:22
Getting source and destination MAC address from received packets
24:46
Sniffing FTP username and password - part 1
08:12
Sniffing FTP username and password - part 2
12:12
Getting passwords from HTTP websites
14:04
Section 6: Coding DNS spoofer
48:06
Cloning any webpage
10:37
Printing DNS queries
10:01
Redirecting response to cloned page
16:48
Setting IP table rules and running DNS spoofer
10:40
Section 7: Network analysis
1:20:51
Analyzing Ethernet header
16:10
Analyzing IP header - part 1
10:28
Analyzing IP header - part 2
25:36
Analyzing TCP header
15:16
Analyzing UDP header
13:21
Section 8: Multi functioning reverse shell
3:14:57
Theory behind socket programming
07:21
Wine & Pyinstaller installation
07:45
Setting up listener
08:20
Establishing connection between target and server
06:33
Implementing send & recv functions
11:30
Executing commands on target system
11:45
Importing JSON library to parse data
08:21
Converting Python backdoor to .exe
08:15
Using OS library to change directory
10:01
Downloading & uploading files to target PC
19:08
Hiding our backdoor and creating persistence
13:50
Trying to connect to server every 20 seconds
07:55
Downloading files to target PC
11:52
Capturing screenshot on target PC
23:08
Administrator privilege check
08:16
Starting other programs with our shell
10:47
Running our shell as an image, audio, Pdf...
20:10
Section 9: Coding keylogger
38:09
Installing Pynput
06:21
Printing space character
08:50
Calling timer on our keylogger
09:58
Adding keylogger to our backdoor
13:00
Section 10: Command and control center
1:17:45
What is a threaded server
05:07
Accepting connections with a thread
13:14
Managing multiple sessions
08:41
Testing threaded server with Windows 10 target
09:06
Fixing Q command
11:14
Coding exit function
13:54
Attacking multiple targets and gathering botnet
16:29
Section 11: Website penetration testing with Python
2:26:09
Stealing saved wireless passwords
22:00
Saving passwords to a file
03:03
Bruteforcing Gmail
10:15
Bruteforcing any login page - part 1
13:02
Bruteforcing any login page - part 2
10:11
Finding hidden directories - part 1
05:12
Finding hidden directories - part 2
06:40
Discovering subdomains
11:33
Changing HTTP headers
14:00
Starting basic and digest authentication bruteforcer
10:25
Controlling threads
08:37
Coding run function
10:10
Printing usage and testing our program
12:39
Taking a look at ransomware
08:22

About the Instructor

90.4% of students rated this instructor as excellent!

Jerry Banfield is a popular YouTuber with more than 285K followers and the founder of Uthena.com. He has more than 8 years of experience working as an entrepreneur online. His broad spectrum of sharing knowledge includes 144+ video classes, 21 books, 828+ blog posts, 1,034+ podcast episodes, and 2,630+ YouTube videos!

Jerry Banfield is popular not only on YouTube but also on Facebook (2,2M followers), Twitter (93K followers), and Instagram (16K followers).
Jerry holds a Bachelor’s degree in Science and Criminal Justice from the University of South Carolina and a Master's degree in Arts and Criminology from the University of South Florida.

During the last five years, he has worked hard on diet, exercising, weight control, relationships, health, money, business, speaking, spirituality, and attitude.

On BitDegree, you have an opportunity to be guided by this amazing instructor and advance your skills. You can choose from various Jerry Banfield courses to learn things like ethical hacking, programming, SEO, productivity and more. So take the best course for you and start learning!

See All Instructor Courses

BitDegree platform reviews