If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course:
-
Introduction and setup
-
Port and vulnerability scanning
-
SSH and FTP attacks
-
Password cracking
-
Sniffers, flooders and spoofers
-
DNS spoofing
-
Network analysis
-
Coding a multi-functioning reverse shell
-
Keyloggers
-
Command and control center
-
Website penetration testing
This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.
Still not sold? Check out these great reviews!
“It’s already fun wow. I enjoy learning ethical hacking and python”
“Great even for non-programmers!”
“Great Course”
Thank you for taking the time to read this and we hope to see you in the course!
Port and Vulnerability Scanning
SSH and FTP Attacks
-
6Coding a simple port scanner
-
7Adding raw_input to our port scanner
-
8Scanning the first 1,000 ports
-
9Coding an advanced port scanner part 1
-
10Coding an advanced port scanner part 2
-
11Finishing and testing our scanner
-
12Configuring IP address and installing Metasploitable
-
13Returning banner from open port
-
14Coding a vulnerability scanner part 1
-
15Coding a vulnerability scanner part 2
Password Cracking
Sniffers, Flooders and Spoofers
Coding DNS Spoofer
-
27Changing MAC address manually
-
28Coding MAC address changer
-
29Theory behind ARP spoofing
-
30Crafting malicious ARP packet
-
31Coding ARP spoofer
-
32Forwarding packets and restoring ARP tables
-
33Spoofing our IP address and sending message with TCP payload
-
34Running SynFlooder with changed source IP address
-
35Getting source and destination MAC address from received packets
-
36Sniffing FTP username and password part 1
-
37Sniffing FTP username and password part 2
-
38Getting passwords from HTTP websites
Network Analysis
Multi-functioning Reverse Shell
Coding a Keylogger
-
48Theory behind socket programming
-
49Wine and Pyinstaller installation
-
50Setting up listener
-
51Establishing connection between target and server
-
52Implementing send & receive functions
-
53Executing commands on target system
-
54Importing JSON library to parse data
-
55Converting Python backdoor to .exe
-
56Using OS library to change directory
-
57Downloading & uploading files to target PC
-
58Hiding our backdoor and creating persistence
-
59Trying to connect to server every 20 seconds
-
60Downloading files to target PC
-
61Capturing screenshot on target PC
-
62Administrator privilege check
-
63Starting other programs with our shell
-
64Running our shell as an image, audio, PDF