Ethical Hacking With Python, JavaScript and Kali Linux
- Description
- Curriculum
- FAQ
- Reviews
Welcome to this most comprehensive course on Ethical Hacking. Hacking is not always a rewarding activity but it is one of the most fun profession where you can use your knowledge to make yours and others system secured. This course will try to turn you into a person who can check for the vulnerability in the system and make your own payload to pen-test that system and evaluate proper security measures that needs to be adopted. We’ll try to make payloads and test systems from section one, Thus this course is highly practical. We (Bit4Stack Tech Inc.) assumes that you have no prior knowledge in these topics, So we will provide some theory related to networking at the beginning and hands on examples with it.
We will cover three modules in this course. Every module will have rich contents related to Hacking. First module covers about Kali Linux and its Hacking Applications. We will go through most of the applications that are available in Kali Linux like airodump-ng, mitmf, wireshark, veil framework, beef framework and lots more. Second module covers Python programming and pen testing machines with it. First of all we will learn about basics of python and we will make applications like mac changer, port scanner and crawler with python. We will have dedicated section to write malware and backdoor with python. Third module covers about JavaScript and its use in web pen-testing. We will make our own payload to find vulnerability in test and live websites. Attacks like XSS, URL redirection, HTML Injection and Host Header Injection.
Highlights of Course:
-
Kali Linux:
-
Linux Commands
-
Basic File System commands
-
Upgrade packaging commands
-
permission commands
-
-
Installing Victim and Hacker Machine in Virtual Box
-
Installing test windows 10 on Virtual Box
-
-
Information Gathering
-
Using netdiscover and nmap to uncover IP addresses and mac addresses
-
-
WPA/WPS attacks
-
Using airodump-ng to sniff packets
-
Using Handshake protocols
-
Using aireplay-ng to deauth clients
-
-
Man In the Middle Framework
-
ARP Spoofing
-
Plugins to take screenshot and inject js-url and jskeylogger
-
-
WireShark
-
Analyzing packets flow
-
-
Veil Framework
-
Creating undetectable backdoor
-
Create reverse shell
-
-
Beef Framework
-
Browser Exploitation
-
Running multiple Hook commands
-
-
-
Python:
-
Python Crash Course
-
Variable and Statements
-
Values and types
-
Flow controls
-
Functions
-
Object Oriented Programming
-
Regular Expression
-
Threading and many more..
-
-
Port Scanner and Nmap
-
Scan for IP, mac addresses and Open Port of machine
-
UDP, TCP and Comprehensive scan
-
-
Mac changer
-
Using subprocess
-
-
Writing a Keylogger
-
pynput keylogger
-
pyperclip keylogger
-
-
Writing a Malware and Backdoor
-
Undetectable backdoor and malware
-
Captures screenshot, Locks PC, Opens Web browser, Hijacks Saved Passwords
-
Hack cmd of window client
-
-
Writing a web Crawler
-
Write crawler to find subdomains and links
-
Using BeautifulSoup
-
-
-
JavaScript:
-
Introduction to BurpSuite
-
Burpsuite: Repeater, Audit and Crawl, Intruder
-
-
Cross Site Scripting Attacks
-
Make custom payloads
-
Hijack Events
-
run multiple payloads to test for XSS in live websites
-
-
URL Redirection
-
URL Path Fragment
-
URL path redirection
-
-
HTML injection
-
Host Header Injection
-
XML External Entity attack
-
-
Anonymous:
-
TOR network
-
Host .onion website
-
-
VPN
-
Proxy Chains
-
Mac Changer
-
and many more!
-
Misc topics:
-
Basics of network hacking / penetration testing.
-
Changing MAC address & bypassing filtering.
-
Network mapping.
-
ARP Spoofing – redirect the flow of packets in a network.
-
Spying on any client connected to the network – see usernames, passwords, visited urls ….etc.
-
Inject code in pages loaded by any computer connected to the same network.
-
Replace files on the fly as they get downloaded by any computer on the same network.
Python/JavaScript:
-
Create malware for Windows, OS X and Linux.
-
Hack Windows, OS X and Linux using custom backdoor.
-
Bypass Anti-Virus programs.
-
Use fake login prompt to steal credentials.
-
Display fake updates.
-
Use own keylogger to spy on everything typed on a Windows or OS X computer.
-
Learn the basics of website hacking / penetration testing.
-
Discover subdomains.
-
Discover hidden files and directories in a website.
-
Discover and exploit XSS vulnerabilities, XXE and HTMLI.
DISCLAIMER:
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, we highly condemn it. We cannot be held responsible for any misuse of the given information.
-
4Installing Hacker & Victim Machine in Virtual BoxVideo lesson
-
5Linux CommandsVideo lesson
-
6apt-get commandVideo lesson
-
7chmod commandVideo lesson
-
8Networking Basics: Before HackingVideo lesson
-
9Information GatheringVideo lesson
-
10Airmon-ng: Change Default mode of adapter to monitor modeVideo lesson
-
11Change Managed Mode to Monitor Mode: Manual MethodVideo lesson
-
12Crack WPA: airodump-ng and crunchVideo lesson
-
13Crack WPA with WordlistVideo lesson
-
14Man In The Middle Framework: ARP SpoofVideo lesson
-
15ARP Spoofing and Capturing Packets with MITMFVideo lesson
-
16MITMF PluginsVideo lesson
-
17Inject Keylogger and take Screenshots with MITMFVideo lesson
-
18Wireshark and MITMF Together to Hijack HTTP requestsVideo lesson
-
19Installing and configuring Veil FrameworkVideo lesson
-
20Custom Payload with VeilVideo lesson
-
21Making Backdoor: Reverse_HTTPS with VeilVideo lesson
-
22Configuring Listener with msfconsoleVideo lesson
-
23Veil in action to get Connection from ClientVideo lesson
-
24Introduction to Beef FrameworkVideo lesson
-
25Beef & MITMF in action to exploit Client BrowserVideo lesson
-
26Ethical Hacking QuizQuiz
-
27Start Python Crash Course: Command, Statement & ScriptsVideo lesson
-
28Keywords and typesVideo lesson
-
29Variables in PythonVideo lesson
-
30Formatting your textVideo lesson
-
31Operators, Operands and LogicVideo lesson
-
32Flow Controls: ConditionalsVideo lesson
-
33Flow Controls: LoopingVideo lesson
-
34User Defined and Lambda FunctionsVideo lesson
-
35Scope and Packing, Unpacking ArgumentsVideo lesson
-
36File Handling with PythonVideo lesson
-
37Data Structure: ListsVideo lesson
-
38Strings and inbuilt_methodsVideo lesson
-
39Data Structure: DictionaryVideo lesson
-
40Data Structure: TuplesVideo lesson
-
41Object Oriented ProgrammingVideo lesson
-
42Python InheritanceVideo lesson
-
43List ComprehensionVideo lesson
-
53Introduction to NMAP Scanner & nmap moduleVideo lesson
-
54TCP, UDP and Comprehensive scan with nmapVideo lesson
-
55Making PortScanner: Clone of NetDiscover tools of KaliVideo lesson
-
56Using Scapy Module to implement ARP protocolsVideo lesson
-
57Formatting Responses to get IP and MAC addresses of ClientsVideo lesson
-
60Scripts for running commands on ClientsVideo lesson
-
61WIFI Password of Client with Delivery Method to GmailVideo lesson
-
62Downloading files ScriptVideo lesson
-
63Beelogger: Modify your KeyloggerVideo lesson
-
64Making Advance KeyloggerVideo lesson
-
65Deliver Keylogger and Observe KeylogsVideo lesson
-
66Implementation of Download file feature in ClientVideo lesson
-
67LaZagne: Capture Password with Our MalwareVideo lesson
-
68Packaging of Python File in LinuxVideo lesson
-
69Packaging technique to bypass AntivirusesVideo lesson
-
70Convert Backdoor to TrojansVideo lesson
-
71Threading with PythonVideo lesson
-
72Backdoor and Socket ProgrammingVideo lesson
-
73Send and Recieve Data Between Server & ClientVideo lesson
-
74Start Advance Payloads making Listener: Kali LinuxVideo lesson
-
75Run Multiple Threads with threading moduleVideo lesson
-
76List all connectionsVideo lesson
-
77Client: Sandboxie, Mutex and VMsVideo lesson
-
78Connect to Server and List ConnectionsVideo lesson
-
79Interact with connectionVideo lesson
-
80Send Message to Client From BackdoorVideo lesson
-
81Open Web Browser of Windows Machine from BackdoorVideo lesson
-
82Take Screenshots from BackdoorVideo lesson
-
83Lock Client using BackdoorVideo lesson
-
84Hijack Command Shell of Client: Server SideVideo lesson
-
85Hijack Command Shell of Client: Client SideVideo lesson
-
86Test Backdoor with AntivirusesVideo lesson
External Links May Contain Affiliate Links read more