Home Courses Instructor Labs

Python Hacking Course from Beginner to Advanced!

(26 Ratings) 2322 Students Enrolled
Created By Valdon P Last Updated Thu, 06-Aug-2020 English
  • Course Duration
    16 Hours
  • Mode of Training
    Self-Paced
  • Lessons
    84 Lessons
  • Placement Assistance
    Guaranteed
$ 149.99 $ 14.99 90% off 100% Money Back Guarantee
12k+ satisfied learners Read Reviews
What Will I Learn?
  • Learn about Ethical Hacking and Penetration testing
  • Learn how to do port and vulnerability scanning
  • Network Security
  • Learn about SSH and FTP attacks
  • Network Analysis

Requirements
  • Basic knowledge on Ethical Hacking
+ View More
Description

This Python hacking course helps you to learn ethical hacking and penetration testing while working on practical Python coding projects. This python hacking course is designed for one who wants to learn intermediate to advanced level ethical hacking. The following topics are covered in this course.

  • Introduction
  • Port & Vulnerability scanning
  • SSH and FTP attacks
  • Password cracking
  • Sniffers, flooders and Spoofers
  • DNS spoofing
  • Multiple functional coding in reverse shell
  • Keyloggers
  • Command and control center
  • Website penetration testing

This course is mainly designed for Python developers who are interested in ethical hacking and network security.


Curriculum For This Course
84 Lessons 16 Hours
  • Virtual box installation 00:11:39 Preview
  • Kali Linux installation 00:17:06 Preview
  • Adding Guest Additions 00:15:07
  • Coding a simple port scanner 00:15:30 Preview
  • Adding raw_input to our port scanner 00:09:21
  • Scanning the first 1,000 ports 00:04:46
  • Coding an advanced port scanner part 1 00:13:12
  • Coding an advanced port scanner part 2 00:08:48
  • Finishing and testing our scanner 00:08:56
  • Configuring IP address and installing Metasploitable 00:08:14
  • Returning banner from open port 00:14:45
  • Coding a vulnerability scanner part 1 00:11:55
  • Coding a vulnerability scanner part 2 00:07:20
  • Automating SSH login part 1 00:09:55 Preview
  • Automating SSH login part 2 00:09:21
  • Testing our SSH login program 00:08:35
  • Coding a SSH brute-forcer 00:10:37
  • Executing commands on target after brute-forcing SSH 00:10:10
  • Anonymous FTP login attack 00:09:53
  • Username & password list attack on FTP 00:17:32
  • SHA256, SHA512, MD5 00:08:37 Preview
  • Cracking SHA1 hash with online dictionary 00:16:41
  • Getting password from MD5 hash 00:13:23
  • Changing MAC address manually 00:08:34
  • Coding MAC address changer 00:16:56
  • Theory behind ARP spoofing 00:04:42
  • Crafting malicious ARP packet 00:19:26
  • Coding ARP spoofer 00:13:32
  • Forwarding packets and restoring ARP tables 00:08:05
  • Spoofing our IP address and sending message with TCP payload 00:12:01
  • Running SynFlooder with changed source IP address 00:11:20
  • Getting source and destination MAC address from received packets 00:24:46
  • Sniffing FTP username and password part 1 00:08:10
  • Sniffing FTP username and password part 2 00:12:09
  • Getting passwords from HTTP websites 00:14:01
  • Cloning any webpage 00:10:36
  • Printing DNS queries 00:09:58
  • Redirecting response to cloned page 00:16:45
  • Setting IP table rules and running DNS spoofer 00:10:35
  • Analyzing Ethernet header 00:16:07
  • Analyzing IP header part 1 00:10:25
  • Analyzing IP header part 2 00:25:34
  • Analyzing UDP header 00:13:21
  • Theory behind socket programming 00:07:20
  • Wine and Pyinstaller installation 00:07:41
  • Setting up listener 00:08:18
  • Establishing connection between target and server 00:06:31
  • Implementing send & receive functions 00:11:28
  • Executing commands on target system 00:11:43
  • Importing JSON library to parse data 00:08:19
  • Converting Python backdoor to .exe 00:08:14
  • Using OS library to change directory 00:09:58
  • Downloading & uploading files to target PC 00:19:07
  • Trying to connect to server every 20 seconds 00:07:53
  • Downloading files to target PC 00:11:49
  • Capturing screenshot on target PC 00:23:05
  • Administrator privilege check 00:08:14
  • Starting other programs with our shell 00:10:44
  • Running our shell as an image, audio, PDF 00:20:05
  • Installing Pynput 00:06:20
  • Printing space character 00:08:49
  • Calling timer on our keylogger 00:09:56
  • Adding keylogger to our backdoor 00:12:58
  • What is a threaded server? 00:05:06
  • Accepting connections with a thread 00:13:12
  • Managing multiple sessions 00:08:40
  • Testing threaded server with Windows 10 target 00:09:04
  • Fixing Q command 00:11:11
  • Coding exit function 00:13:51
  • Attacking multiple targets and gathering botnet 00:16:27
  • Stealing saved wireless passwords 00:21:56
  • Saving passwords to a file 00:03:02
  • Bruteforcing Gmail 00:10:14
  • Bruteforcing any login page part 1 00:13:00
  • Bruteforcing any login page part 2 00:10:07
  • Finding hidden directories part 1 00:05:11
  • Finding hidden directories part 2 00:06:36
  • Discovering subdomains 00:11:32
  • Changing HTTP headers 00:13:56
  • Starting basic and digest authentication bruteforcer 00:10:23
  • Controlling threads 00:08:35
  • Coding run function 00:10:06
  • Printing usage and testing our program 00:12:33
  • Taking a look at ransomware 00:08:20

Python Hacking Course from Beginner to Advanced!