Course Description
Ethical hacking identifies potential threats and vulnerabilities on a computer network and reports them to the organization. Python is preferred for ethical hacking due to its abundance of libraries and tools. You do not need any prior knowledge to take this course.
What You Will Learn
- Python for ethical hacking!
- Port and vulnerability scanning
- SSH & FTP attacks
- Password cracking
- Sniffers, flooders, and spoofers
- Coding DNS spoofer
- Network analysis
- and more…
Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Making simple port scanner (15:33)
- Adding raw_input to our port scanner (9:24)
- Scanning first 1000 ports (4:47)
- Coding advance port scanner - part 1 (13:13)
- Coding advance port scanner - part 2 (8:51)
- Finishing and testing advance port scanner (9:00)
- Configuring IP address and installing Metasploitable (8:14)
- Returning banner from open port (14:46)
- Coding vulnerability scanner - part 1 (11:57)
- Coding vulnerability scanner - part 2 (7:21)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Changing MAC address manually (8:35)
- Coding MAC changer (17:00)
- Theory behind ARP spoofing (4:43)
- Crafting malicious ARP packet (19:28)
- Coding ARP spoofer (13:33)
- Forwarding packets and restoring ARP tables (8:07)
- Spoofing our IP address and sending message with TCP payload (12:02)
- Running SynFlooder with changed source IP address (11:22)
- Getting source and destination MAC address from received packets (24:46)
- Sniffing FTP username and password - part 1 (8:12)
- Sniffing FTP username and password - part 2 (12:12)
- Getting passwords from HTTP websites (14:04)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Theory behind socket programming (7:20)
- Wine & Pyinstaller installation (7:45)
- Setting up listener (8:19)
- Establishing connection between target and server (6:32)
- Implementing send & recv functions (11:30)
- Executing commands on target system (11:44)
- Importing JSON library to parse data (8:21)
- Converting Python backdoor to .exe (8:15)
- Using OS library to change directory (10:00)
- Downloading & uploading files to target PC (19:07)
- Hiding our backdoor and creating persistence (13:50)
- Trying to connect to server every 20 seconds (7:55)
- Downloading files to target PC (11:51)
- Capturing screenshot on target PC (23:08)
- Administrator privilege check (8:15)
- Starting other programs with our shell (10:47)
- Running our shell as an image, audio, Pdf... (20:09)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Stealing saved wireless passwords (22:00)
- Saving passwords to a file (3:03)
- Bruteforcing Gmail (10:15)
- Bruteforcing any login page - part 1 (13:01)
- Bruteforcing any login page - part 2 (10:11)
- Finding hidden directories - part 1 (5:12)
- Finding hidden directories - part 2 (6:40)
- Discovering subdomains (11:33)
- Changing HTTP headers (14:00)
- Starting basic and digest authentication bruteforcer (10:25)
- Controlling threads (8:37)
- Coding run function (10:10)
- Printing usage and testing our program (12:38)
- Taking a look at ransomware (8:22)
Check your inbox to confirm your subscription