Curriculum
12 Sections
90 Lessons
Lifetime
Expand all sections
Collapse all sections
Section 1: 1 Introduction to Python for ethical hacking!
5
1.1
1. Welcome to Python for ethical hacking!
6 Minutes
1.2
2. VirtualBox 6.0.4 installation
1 Minute
1.3
3. Kali Linux 2019.1a installation
17 Minutes
1.4
4. Guest additions installation
15 Minutes
1.5
5. Python in Kali terminal
14 Minutes
Section 2: 2 Port and vulnerability scanning
10
2.1
6. Making simple port scanner
16 Minutes
2.2
7. Adding raw_input to our port scanner
10 Minutes
2.3
8. Scanning first 1000 ports
5 Minutes
2.4
9. Coding advance port scanner – part 1
13 Minutes
2.5
10. Coding advance port scanner – part 2
9 Minutes
2.6
11. Finishing and testing advance port scanner
9 Minutes
2.7
12. Configuring IP address and installing Metasploitable
8 Minutes
2.8
13. Returning banner from open port
15 Minutes
2.9
14. Coding vulnerability scanner – part 1
12 Minutes
2.10
15. Coding vulnerability scanner – part 2
8 Minutes
Section 3: 3 SSH & FTP attacks
7
3.1
16. Automating SSH login – part 1
10 Minutes
3.2
17. Automating SSH login – part 2
10 Minutes
3.3
18. Testing SSH login program
9 Minutes
3.4
19. Coding SSH Bruteforcer
11 Minutes
3.5
20. Executing command on target after brute forcing SSH
11 Minutes
3.6
21. Anonymous FTP login attack
10 Minutes
3.7
22. Username & password list attack on FTP
18 Minutes
Section 4: 4 Password cracking
4
4.1
23. SHA256, SHA512 and MD5
9 Minutes
4.2
24. Cracking SHA1 hash with online dictionary
17 Minutes
4.3
25. Getting password from MD5 hash
14 Minutes
4.4
26. Cracking crypt password with Salt
24 Minutes
Section 5: 5 Sniffers, flooders, and spoofers
12
5.1
27. Changing MAC address manually
9 Minutes
5.2
28. Coding MAC changer
17 Minutes
5.3
29. Theory behind ARP spoofing
5 Minutes
5.4
30. Crafting malicious ARP packet
20 Minutes
5.5
31. Coding ARP spoofer
14 Minutes
5.6
32. Forwarding packets and restoring ARP tables
8 Minutes
5.7
33. Spoofing our IP address and sending message with TCP payload
12 Minutes
5.8
34. Running SynFlooder with changed source IP address
12 Minutes
5.9
35. Getting source and destination MAC address from received packets
25 Minutes
5.10
36. Sniffing FTP username and password – part 1
8 Minutes
5.11
37. Sniffing FTP username and password – part 2
12 Minutes
5.12
38. Getting passwords from HTTP websites
14 Minutes
Section 6: 6 Coding DNS spoofer
4
6.1
39. Cloning any webpage
11 Minutes
6.2
40. Printing DNS queries
10 Minutes
6.3
41. Redirecting response to cloned page
17 Minutes
6.4
42. Setting IP table rules and running DNS spoofer
11 Minutes
Section 7: 7 Network analysis
5
7.1
43. Analyzing Ethernet header
16 Minutes
7.2
44. Analyzing IP header – part 1
11 Minutes
7.3
45. Analyzing IP header – part 2
26 Minutes
7.4
46. Analyzing TCP header
16 Minutes
7.5
47. Analyzing UDP header
14 Minutes
Section 8: 8 Multi functioning reverse shell
17
8.1
48. Theory behind socket programming
8 Minutes
8.2
49. Wine & Pyinstaller installation
8 Minutes
8.3
50. Setting up listener
9 Minutes
8.4
51. Establishing connection between target and server
7 Minutes
8.5
52. Implementing send & recv functions
12 Minutes
8.6
53. Executing commands on target system
12 Minutes
8.7
54. Importing JSON library to parse data
9 Minutes
8.8
55. Converting Python backdoor to .exe
9 Minutes
8.9
56. Using OS library to change directory
10 Minutes
8.10
57. Downloading & uploading files to target PC
19 Minutes
8.11
58. Hiding our backdoor and creating persistence
14 Minutes
8.12
59. Trying to connect to server every 20 seconds
8 Minutes
8.13
60. Downloading files to target PC
12 Minutes
8.14
61. Capturing screenshot on target PC
23 Minutes
8.15
62. Administrator privilege check
8 Minutes
8.16
63. Starting other programs with our shell
8 Minutes
8.17
64. Running our shell as an image, audio, Pdf…
20 Minutes
Section 9: 9 Coding keylogger
4
9.1
65. Installing Pynput
7 Minutes
9.2
66. Printing space character
9 Minutes
9.3
67. Calling timer on our keylogger
10 Minutes
9.4
68. Adding keylogger to our backdoor
13 Minutes
Section 10: 10 Command and control center
7
10.1
69. What is a threaded server
5 Minutes
10.2
70. Accepting connections with a thread
13 Minutes
10.3
71. Managing multiple sessions
9 Minutes
10.4
72. Testing threaded server with Windows 10 target
9 Minutes
10.5
73. Fixing Q command
11 Minutes
10.6
74. Coding exit function
14 Minutes
10.7
75. Attacking multiple targets and gathering botnet
16 Minutes
Section 11: 11 Website penetration testing with Python
14
11.1
76. Stealing saved wireless passwords
22 Minutes
11.2
77. Saving passwords to a file
3 Minutes
11.3
78. Bruteforcing Gmail
10 Minutes
11.4
79. Bruteforcing any login page – part 1
13 Minutes
11.5
80. Bruteforcing any login page – part 2
10 Minutes
11.6
81. Finding hidden directories – part 1
5 Minutes
11.7
82. Finding hidden directories – part 2
7 Minutes
11.8
83. Discovering subdomains
12 Minutes
11.9
84. Changing HTTP headers
14 Minutes
11.10
85. Starting basic and digest authentication bruteforcer
11 Minutes
11.11
86. Controlling threads
9 Minutes
11.12
87. Coding run function
10 Minutes
11.13
88. Printing usage and testing our program
13 Minutes
11.14
89. Taking a look at ransomware
9 Minutes
Section 12: 12 Additional Content: Grand Finale
1
12.1
90. Bonus Lectures. Enjoy the Benefits
Python & Ethical Hacking for Cyber Security UPDATED
Search
This content is protected, please
login
and enroll in the course to view this content!
Modal title
Main Content