A to Z Python Hacking Course
at just
$69
Enroll Now
Sign Up
Sign In
A to Z Python Hacking Course
A to Z Python Hacking Course
Section 1 : Introduction and Setup
Lecture 1
Welcome to Python for ethical hacking!
5:16
Lecture 2
VirtualBox installation
11:39
Lecture 3
Kali Linux installation
17:6
Lecture 4
Adding Guest Additions
15:7
Lecture 5
Python in Kali terminal
13:32
Section 2 : Port and Vulnerability Scanning
Lecture 6
Coding a simple port scanner
15:30
Lecture 7
Adding raw_input to our port scanner
9:21
Lecture 8
Scanning the first 1,000 ports
4:46
Lecture 9
Coding an advanced port scanner part 1
Preview
Lecture 10
Coding an advanced port scanner part 2
8:48
Lecture 11
Finishing and testing our scanner
8:55
Lecture 12
Configuring IP address and installing Metasploitable
8:14
Lecture 13
Returning banner from open port
14:45
Lecture 14
Coding a vulnerability scanner part 1
11:55
Lecture 15
Coding a vulnerability scanner part 2
7:20
Section 3 : SSH and FTP Attacks
Lecture 16
Automating SSH login part 1
9:55
Lecture 17
Automating SSH login part 2
9:20
Lecture 18
Testing our SSH login program
8:34
Lecture 19
Coding a SSH brute-forcer
10:37
Lecture 20
Executing commands on target after brute-forcing SSH
10:10
Lecture 21
Anonymous FTP login attack
9:53
Lecture 22
Username & password list attack on FTP
Preview
Section 4 : Password Cracking
Lecture 23
SHA256, SHA512, MD5
8:37
Lecture 24
Cracking SHA1 hash with online dictionary
16:41
Lecture 25
Getting password from MD5 hash
13:23
Lecture 26
Cracking crypt passwords with salt
24:2
Section 5 : Sniffers, Flooders and Spoofers
Lecture 27
Changing MAC address manually
8:34
Lecture 28
Coding MAC address changer
16:56
Lecture 29
Theory behind ARP spoofing
4:42
Lecture 30
Crafting malicious ARP packet
19:26
Lecture 31
Coding ARP spoofer
13:32
Lecture 32
Forwarding packets and restoring ARP tables
8:5
Lecture 33
Spoofing our IP address and sending message with TCP payload
12:1
Lecture 34
Running SynFlooder with changed source IP address
11:20
Lecture 35
Getting source and destination MAC address from received packets
24:46
Lecture 36
Sniffing FTP username and password part 1
8:9
Lecture 37
Sniffing FTP username and password part 2
12:9
Lecture 38
Getting passwords from HTTP websites
14:1
Section 6 : Coding DNS Spoofer
Lecture 39
Cloning any webpage
10:36
Lecture 40
Printing DNS queries
9:58
Lecture 41
Redirecting response to cloned page
16:45
Lecture 42
Setting IP table rules and running DNS spoofer
10:35
Section 7 : Network Analysis
Lecture 43
Analyzing Ethernet header
16:7
Lecture 44
Analyzing IP header part 1
10:25
Lecture 45
Analyzing IP header part 2
25:34
Lecture 46
Analyzing TCP header
15:13
Lecture 47
Analyzing UDP header
13:20
Section 8 : Multi-functioning Reverse Shell
Lecture 48
Theory behind socket programming
Preview
Lecture 49
Wine and Pyinstaller installation
7:41
Lecture 50
Setting up listener
8:18
Lecture 51
Establishing connection between target and server
6:31
Lecture 52
Implementing send & receive functions
11:28
Lecture 53
Executing commands on target system
11:43
Lecture 54
Importing JSON library to parse data
8:19
Lecture 55
Converting Python backdoor to
8:14
Lecture 56
Using OS library to change directory
9:58
Lecture 57
Downloading & uploading files to target PC
19:7
Lecture 58
Hiding our backdoor and creating persistence
13:49
Lecture 59
Trying to connect to server every 20 seconds
7:53
Lecture 60
Downloading files to target PC
11:49
Lecture 61
Capturing screenshot on target PC
23:5
Lecture 62
Administrator privilege check
8:14
Lecture 63
Starting other programs with our shell
10:44
Lecture 64
Running our shell as an image, audio, PDF
20:5
Section 9 : Coding a Keylogger
Lecture 65
Installing Pynput
6:20
Lecture 66
Printing space character
Preview
Lecture 67
Calling timer on our keylogger
9:56
Lecture 68
Adding keylogger to our backdoor
12:58
Section 10 : Command and Control Center
Lecture 69
What is a threaded server
5:6
Lecture 70
Accepting connections with a thread
13:12
Lecture 71
Managing multiple sessions
8:40
Lecture 72
Testing threaded server with Windows 10 target
9:4
Lecture 73
Fixing Q command
11:11
Lecture 74
Coding exit function
13:51
Lecture 75
Attacking multiple targets and gathering botnet
16:27
Section 11 : Website Penetration Testing
Lecture 76
Stealing saved wireless passwords
21:56
Lecture 77
Saving passwords to a file
3:2
Lecture 78
Bruteforcing Gmail
10:13
Lecture 79
Bruteforcing any login page part 1
13:0
Lecture 80
Bruteforcing any login page part 2
10:7
Lecture 81
Finding hidden directories part 1
Preview
Lecture 82
Finding hidden directories part 2
6:36
Lecture 83
Discovering subdomains
11:32
Lecture 84
Changing HTTP headers
13:56
Lecture 85
Starting basic and digest authentication bruteforcer
10:23
Lecture 86
Controlling threads
8:35
Lecture 87
Coding run function
10:6
Lecture 88
Printing usage and testing our program
12:33
Lecture 89
Taking a look at ransomware
8:20
$69
Take this course now.
Enroll Now
Lectures
89
Video
17:21:46 Hours
Skill level
intermdiate
level
Languages
English
Includes
Lifetime access
Certificate of Completion
Preview
×