Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools
Advance your career in cyber security by learning how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools!
Would you like to learn how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools because this knowledge can be useful for you to advance your ethical hacking career?
In this course you will learn:
This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!
Welcome to Python for ethical hacking!FREE PREVIEW
VirtualBox 6.0.4 installationFREE PREVIEW
Kali Linux 2019.1a installationFREE PREVIEW
Guest additions installation
Python in Kali terminal
Making simple port scanner
Adding raw_input to our port scanner
Scanning first 1000 ports
Coding advance port scanner - part 1
Coding advance port scanner - part 2
Finishing and testing advance port scanner
Configuring IP address and installing Metasploitable
Returning banner from open port
Coding vulnerability scanner - part 1
Coding vulnerability scanner - part 2
Automating SSH login - part 1
Automating SSH login - part 2
Testing SSH login program
Coding SSH Bruteforcer
Executing command on target after brute forcing SSH
Anonymous FTP login attack
Username & password list attack on FTP
SHA256, SHA512 and MD5
Cracking SHA1 hash with online dictionary
Getting password from MD5 hash
Cracking crypt password with Salt
Changing MAC address manually
Coding MAC changer
Theory behind ARP spoofing
Crafting malicious ARP packet
Coding ARP spoofer
Forwarding packets and restoring ARP tables
Spoofing our IP address and sending message with TCP payload
Running SynFlooder with changed source IP address
Getting source and destination MAC address from received packets
Sniffing FTP username and password - part 1
Sniffing FTP username and password - part 2
Getting passwords from HTTP websites
Cloning any webpage
Printing DNS queries
Redirecting response to cloned page
Setting IP table rules and running DNS spoofer
Analyzing Ethernet header
Analyzing IP header - part 1
Analyzing IP header - part 2
Analyzing TCP header
Analyzing UDP header
Theory behind socket programming
Wine & Pyinstaller installation
Setting up listener
Establishing connection between target and server
Implementing send & recv functions
Executing commands on target system
Importing JSON library to parse data
Converting Python backdoor to .exe
Using OS library to change directory
Downloading & uploading files to target PC
Hiding our backdoor and creating persistence
Trying to connect to server every 20 seconds
Downloading files to target PC
Capturing screenshot on target PC
Administrator privilege check
Starting other programs with our shell
Running our shell as an image, audio, Pdf...
Printing space character
Calling timer on our keylogger
Adding keylogger to our backdoor
What is a threaded server
Accepting connections with a thread
Managing multiple sessions
Testing threaded server with Windows 10 target
Fixing Q command
Coding exit function
Attacking multiple targets and gathering botnet
Stealing saved wireless passwords
Saving passwords to a file
Bruteforcing any login page - part 1
Bruteforcing any login page - part 2
Finding hidden directories - part 1
Finding hidden directories - part 2
Changing HTTP headers
Starting basic and digest authentication bruteforcer
Coding run function
Printing usage and testing our program
Taking a look at ransomware
This course is available with Private Label Rights (PLR).
When you buy a course with private label rights on Uthena, the author of the course gives you permission to download the course and sell it as your own on your website according to the terms of the PLR license included.
If you would like to know more about the license terms, please visit this page.
After purchasing, you will have access to the course on Uthena and you will receive the PLR license with a download link and a special bonus.
See a sample of the PLR license.
You have the option to buy Master Resell Rights (MRR) to this course, which allows your customers to have the right to sell the course as well.
You can buy Private Label Rights (PLR) for this course and others, click here.
You can buy Master Resell Rights (MRR) for this course and others, click here.