Video description
Are you intrigued by how hackers hack into any computer system easily? Do you want to develop the same skills, but not sure where to start? Don’t worry! This course has got you covered. By combining the power of Python and ethical hacking skills, this course shows you how to write Python programs to break into any computer system with ease.
The course starts with the fundamentals of ethical hacking and Python programming and guides you through the installation process of the software needed. Once the setup is ready, you will learn Python programming from scratch and start writing hacking programs without any delay. You will learn how a system works and find its weaknesses and will learn how to then write a Python program to exploit those weaknesses to hack the system.
To master the craft of hacking, you will learn to write ethical hacking programs from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools, the list goes on. You will also have gained a deep understanding of how computer systems work and how to model problems, design an algorithm to solve problems, and implement solutions using Python.
By the end of this course, you will be well-versed with Python programming and will have developed the skills to write programs in Python to hack a system.
What You Will Learn
- Become confident in writing programs in Python 2 and 3
- Write a backdoor program that works on Windows, OS X, and Linux
- Write a program that can discover vulnerabilities in websites
- Convert malware to Trojans that take the form of an image or a PDF
- Find out techniques to bypass anti-virus programs
- Run dictionary attacks and guess login information on login pages
Audience
If you are new to ethical hacking or Python programming and are eager to learn to hack into systems by writing programs in Python, this course is for you.
No prior programming or hacking knowledge is needed to get started with this course.
About The Author
Zaid Sabih: Zaid Sabih is an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. He has valuable experience in ethical hacking—he started working as a pentester with iSecurity. In 2013, he started teaching his first network hacking course—which received amazing feedback—leading him to publish a number of online ethical hacking courses, each focusing on a specific topic, all of which are dominating ethical hacking. Now, Zaid has more than 300,000 students worldwide.
Table of contents
-
Chapter 1 : Introduction
- Introduction
- Teaser
- Introduction to Python Programming and Ethical Hacking
- Lab Overview
- Initial Preparation
- Installing Kali Linux as a VM on Windows
- Installing Kali Linux as a VM on Apple Mac OS
- Installing Kali Linux as a VM on Linux
- Basic Overview of Kali Linux
- Terminal and Linux Commands
- Python 2 Versus Python 3 and Writing Your First Program
- Installing and Using a Python Integrated Development Environment (IDE)
-
Chapter 2 : Writing a Media Access Control (MAC) Address Changer - Python Basics
- What is Media Access Control (MAC) Address and How to Change it?
- Using Python Modules and Executing System Commands
- Implementing a very Basic Media Access Control (MAC) Changer
- Variables and Strings
- Using Variables in a Media Access Control (MAC) Changer
- Getting Input from the User
- Handling User Input
- Handling Command-Line Arguments
- Initializing Variables Based on Command-Line Arguments
- Functions in Python
- Returning Values from Functions
- Decision Making in Python
- Using Conditional Statements in Media Access Control (MAC) Changer
- Chapter 3 : Media Access Control (MAC) Changer - Algorithm Design
-
Chapter 4 : Programming a Network Scanner
- Introduction and Teaser
- Installing Windows as a Virtual Machine
- What is the Address Resolution Protocol (ARP) and What is it Used For?
- Designing an Algorithm to Discover Clients Connected to the Same Network
- Using Scapy to Create an Address Resolution Protocol (ARP) Request
- Combining Frames to Broadcast Packets
- Sending and Receiving Packets
- Introduction to Lists in Python
- Iterating over Lists and Analyzing Packet
- Using Escape Characters to Enhance Program Output
- Dictionaries
- Improving the Program Using a List of Dictionaries
- Iterating over Nested Data Structures
- Testing the Network Scanner With Python 3
-
Chapter 5 : Writing an Address Resolution Protocol (ARP) Spoofer
- What is Address Resolution Protocol (ARP) Spoofing?
- Redirecting the Flow of Packets in a Network Using arpspoof
- Creating an Address Resolution Protocol (ARP) Response
- Sending Address Resolution Protocol (ARP) Responses
- Extracting Media Access Control (MAC) Address from Responses
- Loops
- More on Loops and Counters
- Dynamic Printing
- Handling Exceptions
- Implementing a Restore Function
- Restoring Address Resolution Protocol (ARP) Tables When an Exception Occurs
-
Chapter 6 : Writing a Packet Sniffer
- Introduction and Teaser
- Sniffing Packets Using Scapy
- Extracting Data from a Specific Layer
- Analyzing Sniffed Packets and Extracting Fields from Layers
- Analyzing Fields and Extracting Passwords
- Extracting URLs
- Capturing Passwords from any Computer Connected to the Same Network
- Strings and Bytes in Python 3
-
Chapter 7 : Writing a Domain Name Server (DNS) Spoofer
- Intercepting Packets - Creating a Proxy
- Converting Packets to Scapy Packets
- What is Domain Name Server (DNS) Spoofing?
- Filtering Domain Name Server (DNS) Responses
- Analyzing and Creating a Custom Domain Name Server (DNS) Response
- Modifying Packets on the Fly
- Redirecting Domain Name Server (DNS) Responses
- Chapter 8 : Writing a File Interceptor
-
Chapter 9 : Writing a Code Injector
- Introduction and Teaser
- Analyzing HTTP Responses
- Replacing a Substring Using Regex
- Decoding HTTP Responses
- Modifying HTTP Responses and Injecting JavaScript Code in HTML Pages
- Refactoring and Housekeeping
- Debugging Issues
- Using Groups and Non-Capturing Regex
- Recalculating Content Length
- Browser Exploitation Framework (BeEF) Overview and Basic Hook Method
- Hooking Computers Using Code Injector
- Basic Browser Exploitation Framework (BeEF) Commands
- Delivering Malware Using the Browser Exploitation Framework (BeEF)
- Chapter 10 : Bypassing HTTPS
- Chapter 11 : Writing an Address Resolution Protocol (ARP) Spoof Detector
-
Chapter 12 : Writing Malware
- Introduction
- Executing a System Command Payload
- Sending Reports by Email
- Filtering Command Output Using Regex
- Stealing Wi-Fi Passwords Saved on a Computer
- Downloading Files from a Program
- Writing Files on a Disk
- Password Recovery Basics
- Using All the Above to Steal Saved Passwords Remotely
- Interacting with the File System
- Chapter 13 : Writing Malware - Keylogger
-
Chapter 14 : Writing Malware – Backdoors
- Introduction and Teaser
- Client-Server Communication and Connection Types
- Connecting Two Remote Computers Using Sockets
- Sending and Receiving Data over Transmission Control Protocol (TCP)
- Executing System Commands Remotely
- Implementing a Server
- Implementing Skeleton for Server-Client Communication
- Refactoring – Creating a Listener Class
- Refactoring – Creating a Backdoor Class
- Serialization – Theory
- Serialization - Implementing Reliable Methods to Send and Receive Data over Transmission Control Protocol (TCP)
- Serialization – Reliably Sending and Receiving Data
- Sending Commands as List and Implementing the Exit Command
- Interacting with the File System – Implementing the "cd" Command
- Reading Files
- Writing Files
- Downloading Files from a Hacked Computer
- Implementing Upload Functionality Using Listener
- Implementing Upload Functionality Using Backdoor
- Handling Unknown Exceptions
- Using the Backdoor to Hack Windows, Linux, and OS X
- Testing the Backdoors with Python 3.
-
Chapter 15 : Writing Malware – Packaging
- Introduction and Teaser
- Converting Python Programs to Windows Binary Executables
- Running Executables Silently
- Installing Windows PyInstaller on Linux
- Packaging Programs for Windows from Linux
- Persistence Idea
- Running Programs on Startup
- Creating a Basic Trojan Using the Download and Execute Payload
- Creating a Trojan by Embedding Files in Program Code
- Bypassing Anti-Virus Programs – Theory
- Bypassing Anti-Virus Programs - Practical
- Adding an Icon to Generated Executables
- Spoofing File Extension
- Converting Python Programs to OS X Executables
- Converting Python Programs to Linux Executables
- Chapter 16 : Website/Web Application Hacking
-
Chapter 17 : Website Hacking - Writing a Crawler
- Sending GET Requests to Web Servers
- Discovering Subdomains
- Discovering Hidden Paths on Websites
- Reading Response Content
- Extracting Useful Data from Responses
- Filtering Results
- Extracting Unique Links and Storing Them in a List
- Recursively Discovering All Paths on a Target Website
- Testing the Crawler with Python 3
- Chapter 18 : Writing a Program to Guess Login Information
-
Chapter 19 : Writing a Vulnerability Scanner
- Introduction and Teaser
- HTTP Requests – POST versus GET
- Parsing the HTML Code
- Extracting HTML Attributes
- Posting Forms
- Building Basic Structure for a Vulnerability Scanner
- Using Default Parameters
- Sending Requests in a Session
- Extracting and Submitting Forms Automatically
- Implementing a Method to Run the Scanner
- Discovering Cross-Site Scripting (XSS) Vulnerabilities
- Exploiting Cross-Site Scripting (XSS) Vulnerabilities
- Implementing Code to Discover Cross-Site Scripting (XSS) in Forms
- Implementing Code to Discover Cross-Site Scripting (XSS) in Parameters
- Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
Product information
- Title: Learn Python and Ethical Hacking from Scratch
- Author(s):
- Release date: October 2019
- Publisher(s): Packt Publishing
- ISBN: 9781839214561
You might also like
book
Python Ethical Hacking from Scratch
Explore the world of practical ethical hacking by developing custom network scanning and remote access tools …
book
Learn Ethical Hacking from Scratch
Learn how to hack systems like black hat hackers and secure them like security experts Key …
video
Learn Ethical Hacking From Scratch
Welcome to this comprehensive course on ethical hacking! This course is focused on the practical side …
video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Are you looking to pursue a career in cybersecurity and want to master the art of …