Python & Ethical Hacking Basic to Advanced
Ethical Hacking is the process of identifying potential threats and vulnerabilities on a computer or network through advanced tools and techniques. In this course we are going to see some basic concepts of Python programming such as if, else-if statements to advanced concepts such as creating TCP clients. Unlike other python courses, you not only understand python concepts but also be able to apply the scripts into Kali Linux to test computer systems
What you’ll learn
-
Ethical Hacking
-
Python Programming
-
Penetration Testing
-
Network Security
-
Port and Vulnerability Scanning
-
SSH and FTP Attacks
-
Password Cracking
-
Sniffers, Flooders and Spoofers
-
DNS Spoofing
-
Network Analysis
Course Content:
Module1: Introduction & Setup
-
VirtualBox Installation
-
Kali Linux Installation
-
Adjusting Guest Additions
-
Python in Kali Terminal
Module 2: Port and Vulnerability Scanning
- Coding a Simple Port Scanner
- Adding rawinput to Our Port Scanner
- Scanning the First 1,000 Ports
-
Coding an Advanced Port Scanner Part 1
-
Coding an Advanced Port Scanner Part 2
-
Finishing and Testing Our Scanner
-
Configuring IP Address and Installing Metasploitable
-
Returning Banner from Open Port
-
Coding a Vulnerability Scanner Part 1
-
Coding a Vulnerability Scanner Part 2
Module3 : SSH and FTP Attacks
- Automating SSH Login Part 1
- Automating SSH Login Part 2
-
Testing Our SSH Login Program
-
Coding a SSH Brute-forcer
-
Executing Commands on Target After Brute-forcing SSH
-
Anonymous FTP Login Attack
-
Username and Password List Attack on FTP
Module 4: Password Cracking
-
SHA256, SHA512, MD5
-
Cracking SHA1 Hash with Online Dictionary
-
Getting Password from MD5 Hash
-
Cracking Crypt Passwords with Salt
Module5: Sniffers, Flooders, and Spoofers
- Changing MAC Address Manually
- Coding MAC Address Changer
- Theory Behind ARP Spoofin
- Crafting Malicious ARP Packet
- Coding ARP Spoofer
-
Forwarding Packets and Restoring ARP Tables
-
Spoofing Our IP Address and Sending Message with TCP Payload
-
Running SynFlooder with Changed Source IP Address
-
Getting Source and Destination MAC Address from Received Packets
-
Sniffing FTP Username and Password Part 1
-
Sniffing FTP Username and Password Part 2
-
Getting Passwords from HTTP Websites
Chapter 6: Coding DNS Spoofer
-
Cloning Any Webpage
-
Printing DNS Queries
-
Redirecting Response to Cloned Page
-
Setting IP Table Rules and Running DNS Spoofer
Module 7: Network Analysis
- Analyzing Ethernet Header
- Analyzing IP Header Part 1
- Analyzing IP Header Part 2
- Analyzing TCP Header
- Analyzing UDP Header
Module 8: Multi-functioning Reverse Shell
-
Theory Behind Socket Programming
-
Wine and Pyinstaller Installation
-
Setting up Listener
-
Establishing Connection Between Target and Server
-
Implementing Send and Receive Functions
-
Executing Commands on Target System
-
Importing JSON Library to Parse Data
-
Converting Python Backdoor to .exe
-
Using OS Library to Change Directory
-
Downloading and Uploading Files to Target PC
-
Hiding Our Backdoor and Creating Persistence
-
Trying to Connect to Server Every 20 Seconds
-
Downloading Files to Target PC
-
Capturing Screenshot on Target PC
-
Administrator Privilege Check
-
Starting Other Programs with Our Shell
-
Running Our Shell as an Image, Audio, PDF
Module9: Coding a Keylogger
-
Installing Pynput
-
Printing Space Character
-
Calling Timer on Our Keylogger
-
Adding Keylogger to Our Backdoor
Module 10: Command and Control Center
- What is a Threaded Server?
- Accepting Connections with a Thread
- Managing Multiple Sessions
-
Testing Threaded Server with Windows 10 Target
-
Fixing Q Command
-
Coding Exit Function
-
Attacking Multiple Targets and Gathering Botnet
Who this course is for:
- Python developers interested in ethical hacking and network security.
- Students interested in learning Python, a powerful scripting language.
Prerequisites
-
A basic understanding of ethical hacking related concepts.
International Student Fee: 300$
Job Interview Preparation (Soft Skills Questions & Answers)
- Tough Open-Ended Job Interview Questions
- What to Wear for Best Job Interview Attire
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
- Join Internships and Referral Program (click for details)
- Work as Freelancer or Full-Time Employee (click for details)
Flexible Class Options
- Week End Classes For Professionals SAT | SUN
- Corporate Group Trainings Available
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Courses
System Administrator Fundamentals (for Ethical Hacking Foundation Online Course)
Ethical Hacking Professional with KALI Linux
Ethical Hacking Training Course (BootCamp)
Ethical Hacking Training with Penetration Testing (2 in 1) Course
Ethical Hacking Training – Complete Ethical Hacking Course
Python Programming Basic To Advance