Mastering in Python Programming For Hacking From Scratch

  • 11-Using Python Modules _ Executing System Commands 
    • Introduction
    • 1.Introduction
    • 2.Teaser
    • 3.What is programming_What is Hacking _ Why Learn ...
    • 4.Lab Over View _ Needed Software
    • Resource - Download VirtualBox
    • 5. Installing Kali as a virtual Machine
    • Resource - Install Kali Linux
    • Got a Blank Screen After Importing Kali in Virtual...
    • Resource - How To Fix Nat Network Issue In Virtual...
    • 6.Basic Over View Of Kali Linux
    • How To Use a USB Wireless Adapter With Kali In Vir...
    • 7.The Terminal _ Linux Commands
    • Resource - Terminal & Linux Commands
    • 8.Python2 Vs Python 3 _ Writing First Program
    • 9.Installing _ Using PuthonIDE
    • Resource - 9.Installing _ Using PuthonIDE
    • Writing a MAC Address Changer - Python Basics
    • 10 - What is MAC Address _ How To Change it
    • Resource - What is MAC Address _ How To Change it
    • 11-Using Python Modules _ Executing System Command...
    • 12.Implementing a Very Basic Mac Changer
    • 13.Variables _ Strings
    • 14.Using Variabled in MAC Changer
    • 15.Getting Input From The User
    • 16.Handling User Input
    • 17. Handling Command-line Arguments
    • 18. Initialising Variables Based on Command-line A...
    • 19.Functions
    • 20.Returning Valus From Functions
    • 21.Decision Making - Theory
    • 22.Using Conditional Statements in MAC Changer
    • MAC Changer - Algorithm Design
    • 23.What is an Algorithm.mp4
    • 24.Reading Outout Returned By System Command
    • 25.Regular Expressions_Regex_.mp4
    • 26.Extracting a Substring Using Regex
    • 27.Refactoring _ Housekeeping
    • 28.Implementing The Algorithm to Check The Mac Did...
    • Programming a Network Scanner
    • 29.Introduction _ Teaser
    • 30.Installing Windows as a Virtual Maching
    • 31.What isARP _ What its Used For
    • 32.Designing an Algoithm To Discover Clients Conne...
    • 33.Using Scapy To Create an ARP Request
    • 34. Combining Frames To BroadcastRequest
    • 35. Sending & Receiving Packets
    • 36. Lists
    • 37. Iterating Over Lists & Analysing Packet
    • 38. Using Escape Characters To Enhance Program Out...
    • 39. Dictionaries
    • 40. Improving the Program Using a List of Dictiona...
    • 41. Iterating Over Nested Data Structures
    • 42. Python 3 Compatibility
    • Writing an ARP Spoofer
    • 43. What is ARP Spoofing?
    • 44. Redirecting the Flow of Packets in a Network U...
    • 45. Creating an ARP Response
    • 46. Sending ARP Responses
    • 47. Extracting MAC Address From Responses
    • 48. Loops
    • 49. More on Loops & Counters
    • 50. Dynamic Printing
    • 51. Handling Exceptions
    • 52. Implementing a Restore Function
    • 53. Restoring ARP Tables When an Exception Occures
    • Writing a Packet Sniffer
    • 54. Introduction & Teaser
    • 55. Sniffing Packets Using Scapy
    • 56. Extracting data From a Specific Layer
    • 57. Analysing Sniffed Packets & Extracting Fields ...
    • 58. Analysing Fields & Extracting Passwords
    • 59. Extracting URLs
    • 60. Capturing Passwords From Any Computer Connecte...
    • Writing a DNS Spoofer
    • 61. Intercepting Packets - Creating a Proxy
    • 62. Converting Packets to Scapy Packets
    • 63. What is DNS Spoofing
    • 64. Filtering DNS Responses
    • 65. Analysing & Creating a Custom DNS Response
    • 66. Modifying Packets On The Fly
    • 67. Redirecting DNS Responses
    • Writing a File Interceptor
    • 68. Introduction & Teaser
    • 69. Filtering Traffic Based on the Port Used
    • 70. Analysing HTTP Requests
    • 71. Intercepting HTTP Requests
    • 72. Modifying HTTP Responses on The Fly
    • 73. Intercepting & Replacing Downloads on The Netw...
    • Writing a Code Injector
    • 74. Introduction & Teaser
    • 75. Analysing HTTP Responses
    • 76. Replacing a Substring Using Regex
    • 77. Decoding HTTP Responses
    • 78. Modifying HTTP Responses & Injecting Javascrip...
    • 79. Refactoring & Housekeeping
    • 80. Debugging Issues
    • 81. Using Groups & None-capturing Regex
    • 82. Recalculating Content Length
    • 83. BeEF Overview & Basic Hook Method
    • 84. Hooking Computers Using code_injector
    • 85. Basic BeEF Commands
    • 85. Basic BeEF Commands
    • 86. Delivering Malware Using BeEF
    • 87. How to Bypass HTTPS
    • 88. Bypassing HTTPS & Sniffing Login Credentials
    • 89. Replacing Downloads on HTTPS Pages
    • 90. Injecting Code in HTTPS Pages
    • Writing an ARP Spoof Detector
    • 91. Running Python Programs on Windows
    • 92. Capturing & Analysing ARP Responses
    • 93. Detecting ARP Spoofing Attacks
    • Writing Malware
    • 94. Introduction & Teaser
    • 95. Execute System Command Payload
    • 96. Sending Reports By Email
    • 97. Filtering Command Output Using Regex
    • 98. Stealing WiFi Passwords Saved on a Computer
    • 99. Downloading Files From Program
    • 100. Writing Files on Disk
    • 101. Password Recovery Basics
    • 102. Using all the Above to Steal Saved Passwords ...
    • 103. Interacting With The File System
    • Writing Malware - Keylogger
    • 104. Introduction & Teaser
    • 105. Writing a Basic Local Keylogger
    • 106. Global Variables
    • 107. Logging Special Keys
    • 108. Threading & Recursion
    • 109. OOP - Object Oriented Programming Basics
    • 110. Constructor Methods & Instance Variables
    • 111. Logging Key-strikes and Reporting Them By Ema...
    • Writing Malware - Backdoors
    • 112. Introduction & Teaser
    • 113. Client - Server Communication & Connection Ty...
    • 114.Learn Python _ Ethical Hacking From Scratch.mp...
    • 115. Sending & Receiving Data Over TCP
    • 116. Executing System Commands Remotely
    • 117. Implementing a Server
    • 118. Implementing Skeleton For Server - Client Com...
    • 119. Refactoring - Creating a Listener Class
    • 120. Refactoring - Creating a Backdoor Class
    • 121. Serialisation - Theory
    • 122. Serialisation - Implementing Reliable Methods
    • 123. Serialisation - Reliably Sending & Receiving ...
    • 124. Sending Commands as List & Implementing Exit ...
    • 125. Interacting With the File System - Implementi...
    • 126. Reading Files
    • 127. Writing Files
    • 128. Downloading Files From Hacked Computer
    • 129. Implementing Upload Functionality in Listener
    • 130. Implementing Upload Functionality in Backdoor
    • 131. Handling Unknown Exceptions
    • 132. Using the Backdoor to Hack Windows, Linux & O...
    • Writing Malware - Packaging
    • 133. Introduction & Teaser
    • 134. Converting Python Programs To Windows Binary ...
    • 135. Running Executables Silentely
    • 136. Installing Windows Pyinstaller on Linux
    • 137. Packaging Programs For Windows From Linux
    • 138. Persistence Idea
    • 139. Running Programs on Startup
    • 140. Creating a Basic Trojan Using Download & Exec...
    • 141. Creating a Trojan By Embedding Files In Progr...
    • 142. Bypassing Anti-Virus Programs - Theory
    • 143. Bypassing Anti-Virus Programs - Practical
    • 144. Adding an Icon to Generated Executables
    • 145. Spoofing File Extension
    • 146. Converting Python Programs To OS X Executable...
    • 147. Converting Python Programs to Linux Executabl...
    • Website / Web Application Hacking
    • 148. Introduction & Teaser
    • 149. What is a Website
    • 150. How to Hack a Website
    • 151. Sending GET Requests To Web Servers
    • 152. Discovering Subdomains
    • 153. Discovering Hidden Paths in Websites
    • 154. Reading Response Content
    • 155. Extracting Useful Data From Response
    • 156. Filtering Rsults
    • 157. Extracting Unique Links & Storing Them In a L...
    • 158. Recursively Discovering All Paths On a Target...
    • Writing a Program To Guess Login Information
    • 159. Sending Post Requests to Websites
    • 160. Guessing Login Information on Login Pages
    • Writing a Vulnerability Scanner
    • 161. Introduction & Teaser
    • 162. HTTP Requests - POST VS GET
    • 163. Parsing HTML Code
    • 164. Extracting HTML Attributes
    • 165. Posting Forms
    • 166. Building Basic Structure For Vulnerability Sc...
    • 167. Using Default Parameters
    • 168. Sending Requests in a Session
    • 169. Extracting & Submitting Forms Automatically
    • 170. Implementing a Method To Run The Scanner
    • 171. Discovering XSS Vulnerabilities
    • 172. Exploiting XSS Vulnerabilities
    • 173. Implementing Code To Discover XSS in Forms
    • 174. Implementing Code To Discover XSS in Paramete...
    • 175. Automatically Discovering Vulnerabilities Usi...
  • Course info
×

Course info

Mastering in Python Programming For Hacking From Scratch

Continue To Order: https://ethicalhackersacademy.com/collec...

Content
  • Introduction
  • 1.Introduction sample
  • 2.Teaser sample
  • 3.What is programming_What is Hacking _ Why Learn Them
  • 4.Lab Over View _ Needed Software
  • Resource - Download VirtualBox
  • 5. Installing Kali as a virtual Machine
  • Resource - Install Kali Linux
  • Got a Blank Screen After Importing Kali in Virtual Box
  • Resource - How To Fix Nat Network Issue In Virtual Box
  • 6.Basic Over View Of Kali Linux
  • How To Use a USB Wireless Adapter With Kali In Virtual Box
  • 7.The Terminal _ Linux Commands
  • Resource - Terminal & Linux Commands
  • 8.Python2 Vs Python 3 _ Writing First Program
  • 9.Installing _ Using PuthonIDE
  • Resource - 9.Installing _ Using PuthonIDE
  • Writing a MAC Address Changer - Python Basics
  • 10 - What is MAC Address _ How To Change it
  • Resource - What is MAC Address _ How To Change it
  • 11-Using Python Modules _ Executing System Commands sample
  • 12.Implementing a Very Basic Mac Changer
  • 13.Variables _ Strings
  • 14.Using Variabled in MAC Changer
  • 15.Getting Input From The User
  • 16.Handling User Input
  • 17. Handling Command-line Arguments
  • 18. Initialising Variables Based on Command-line Arguments
  • 19.Functions
  • 20.Returning Valus From Functions
  • 21.Decision Making - Theory
  • 22.Using Conditional Statements in MAC Changer
  • MAC Changer - Algorithm Design
  • 23.What is an Algorithm.mp4
  • 24.Reading Outout Returned By System Command
  • 25.Regular Expressions_Regex_.mp4
  • 26.Extracting a Substring Using Regex
  • 27.Refactoring _ Housekeeping
  • 28.Implementing The Algorithm to Check The Mac Did Change.mp4
  • Programming a Network Scanner
  • 29.Introduction _ Teaser sample
  • 30.Installing Windows as a Virtual Maching
  • 31.What isARP _ What its Used For
  • 32.Designing an Algoithm To Discover Clients Connected To The Same Network
  • 33.Using Scapy To Create an ARP Request
  • 34. Combining Frames To BroadcastRequest
  • 35. Sending & Receiving Packets
  • 36. Lists
  • 37. Iterating Over Lists & Analysing Packet
  • 38. Using Escape Characters To Enhance Program Output
  • 39. Dictionaries
  • 40. Improving the Program Using a List of Dictionaries
  • 41. Iterating Over Nested Data Structures
  • 42. Python 3 Compatibility
  • Writing an ARP Spoofer
  • 43. What is ARP Spoofing?
  • 44. Redirecting the Flow of Packets in a Network Using arpspoof
  • 45. Creating an ARP Response
  • 46. Sending ARP Responses
  • 47. Extracting MAC Address From Responses
  • 48. Loops
  • 49. More on Loops & Counters
  • 50. Dynamic Printing
  • 51. Handling Exceptions
  • 52. Implementing a Restore Function
  • 53. Restoring ARP Tables When an Exception Occures
  • Writing a Packet Sniffer
  • 54. Introduction & Teaser sample
  • 55. Sniffing Packets Using Scapy
  • 56. Extracting data From a Specific Layer
  • 57. Analysing Sniffed Packets & Extracting Fields From Layers
  • 58. Analysing Fields & Extracting Passwords
  • 59. Extracting URLs
  • 60. Capturing Passwords From Any Computer Connected to the Same Network
  • Writing a DNS Spoofer
  • 61. Intercepting Packets - Creating a Proxy
  • 62. Converting Packets to Scapy Packets
  • 63. What is DNS Spoofing
  • 64. Filtering DNS Responses
  • 65. Analysing & Creating a Custom DNS Response
  • 66. Modifying Packets On The Fly
  • 67. Redirecting DNS Responses
  • Writing a File Interceptor
  • 68. Introduction & Teaser sample
  • 69. Filtering Traffic Based on the Port Used
  • 70. Analysing HTTP Requests
  • 71. Intercepting HTTP Requests
  • 72. Modifying HTTP Responses on The Fly
  • 73. Intercepting & Replacing Downloads on The Network
  • Writing a Code Injector
  • 74. Introduction & Teaser
  • 75. Analysing HTTP Responses
  • 76. Replacing a Substring Using Regex
  • 77. Decoding HTTP Responses
  • 78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
  • 79. Refactoring & Housekeeping
  • 80. Debugging Issues
  • 81. Using Groups & None-capturing Regex
  • 82. Recalculating Content Length
  • 83. BeEF Overview & Basic Hook Method
  • 84. Hooking Computers Using code_injector
  • 85. Basic BeEF Commands
  • 85. Basic BeEF Commands
  • 86. Delivering Malware Using BeEF
  • 87. How to Bypass HTTPS
  • 88. Bypassing HTTPS & Sniffing Login Credentials
  • 89. Replacing Downloads on HTTPS Pages
  • 90. Injecting Code in HTTPS Pages
  • Writing an ARP Spoof Detector
  • 91. Running Python Programs on Windows
  • 92. Capturing & Analysing ARP Responses
  • 93. Detecting ARP Spoofing Attacks
  • Writing Malware
  • 94. Introduction & Teaser sample
  • 95. Execute System Command Payload
  • 96. Sending Reports By Email
  • 97. Filtering Command Output Using Regex
  • 98. Stealing WiFi Passwords Saved on a Computer
  • 99. Downloading Files From Program
  • 100. Writing Files on Disk
  • 101. Password Recovery Basics
  • 102. Using all the Above to Steal Saved Passwords Remotely
  • 103. Interacting With The File System
  • Writing Malware - Keylogger
  • 104. Introduction & Teaser
  • 105. Writing a Basic Local Keylogger
  • 106. Global Variables
  • 107. Logging Special Keys
  • 108. Threading & Recursion
  • 109. OOP - Object Oriented Programming Basics
  • 110. Constructor Methods & Instance Variables
  • 111. Logging Key-strikes and Reporting Them By Email
  • Writing Malware - Backdoors
  • 112. Introduction & Teaser
  • 113. Client - Server Communication & Connection Types
  • 114.Learn Python _ Ethical Hacking From Scratch.mp4
  • 115. Sending & Receiving Data Over TCP
  • 116. Executing System Commands Remotely
  • 117. Implementing a Server
  • 118. Implementing Skeleton For Server - Client Communication
  • 119. Refactoring - Creating a Listener Class
  • 120. Refactoring - Creating a Backdoor Class
  • 121. Serialisation - Theory
  • 122. Serialisation - Implementing Reliable Methods
  • 123. Serialisation - Reliably Sending & Receiving Data
  • 124. Sending Commands as List & Implementing Exit Command
  • 125. Interacting With the File System - Implementing "cd" Command
  • 126. Reading Files
  • 127. Writing Files
  • 128. Downloading Files From Hacked Computer
  • 129. Implementing Upload Functionality in Listener
  • 130. Implementing Upload Functionality in Backdoor
  • 131. Handling Unknown Exceptions
  • 132. Using the Backdoor to Hack Windows, Linux & OS X
  • Writing Malware - Packaging
  • 133. Introduction & Teaser
  • 134. Converting Python Programs To Windows Binary Executables
  • 135. Running Executables Silentely
  • 136. Installing Windows Pyinstaller on Linux
  • 137. Packaging Programs For Windows From Linux
  • 138. Persistence Idea
  • 139. Running Programs on Startup
  • 140. Creating a Basic Trojan Using Download & Execute Payload
  • 141. Creating a Trojan By Embedding Files In Program Code
  • 142. Bypassing Anti-Virus Programs - Theory
  • 143. Bypassing Anti-Virus Programs - Practical
  • 144. Adding an Icon to Generated Executables
  • 145. Spoofing File Extension
  • 146. Converting Python Programs To OS X Executables
  • 147. Converting Python Programs to Linux Executables
  • Website / Web Application Hacking
  • 148. Introduction & Teaser
  • 149. What is a Website
  • 150. How to Hack a Website
  • 151. Sending GET Requests To Web Servers
  • 152. Discovering Subdomains
  • 153. Discovering Hidden Paths in Websites
  • 154. Reading Response Content
  • 155. Extracting Useful Data From Response
  • 156. Filtering Rsults
  • 157. Extracting Unique Links & Storing Them In a List
  • 158. Recursively Discovering All Paths On a Target Website
  • Writing a Program To Guess Login Information
  • 159. Sending Post Requests to Websites
  • 160. Guessing Login Information on Login Pages
  • Writing a Vulnerability Scanner
  • 161. Introduction & Teaser
  • 162. HTTP Requests - POST VS GET
  • 163. Parsing HTML Code
  • 164. Extracting HTML Attributes
  • 165. Posting Forms
  • 166. Building Basic Structure For Vulnerability Scanner
  • 167. Using Default Parameters
  • 168. Sending Requests in a Session
  • 169. Extracting & Submitting Forms Automatically
  • 170. Implementing a Method To Run The Scanner
  • 171. Discovering XSS Vulnerabilities
  • 172. Exploiting XSS Vulnerabilities
  • 173. Implementing Code To Discover XSS in Forms
  • 174. Implementing Code To Discover XSS in Parameters
  • 175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
Completion rules
  • All units must be completed
Close
×

Congratulations!

Course completed!

Course completed!

Download certificate

Continue

Go to next course

×

You didn't quite make it

You didn't quite make it

Unfortunately, you didn't reach a passing score for this course

Go to course list

×

Notice

 Delete  Delete, don't keep asking Cancel
×

Notice

 Delete Cancel
×

Notice

 Discard changes Cancel