Video description
Master ethical hacking while working on practical Python coding projects. Learn Python hacking skills, ethical hacking principles, penetration testing, cybersecurity, and more with over 17 hours of video tutorials. Designed for those with intermediate- to advanced-level understanding of ethical hacking, this course is still taught in a step-by-step, beginner-friendly method. We begin with coding basic port and vulnerability scanning tools; move onto SSH, FTP, and spoofing attacks; take a look at network analysis; and finish up with coding a reverse shell, command and control center, and several website penetration testing tools. Upon completing this course, you will be prepared for a job in the cybersecurity industry.
Learn all these skills while completing eight coding projects:
- Port and vulnerability scanner
- SSH brute-forcer
- MAC address changer
- ARP spoofer
- DNS spoofer
- Multi-functioning reverse shell
- Keylogger
- Command and control center
Distributed by Manning Publications
This course was created independently by Joseph Delgadillo and is distributed by Manning through our exclusive liveVideo platform.
About the Technology
About the Video
What's Inside
- Ethical Hacking
- Penetration Testing
- Network Security
- Port and Vulnerability Scanning
- SSH and FTP Attacks
- Password Cracking
- Sniffers, Flooders and Spoofers
- DNS Spoofing
- Network Analysis
- Multi-functioning Reverse Shell
About the Reader
Basic understanding of ethical hacking and Python programming
About the Author
Joseph Delgadillo is the founder of JTD Courses, an education technology company. He has been active in the online learning industry since 2015 and has worked with several prominent companies. As of 2023, over one million students across the globe have enrolled in his courses covering network security, Python programming, web development and more.
Quotes
Table of contents
- Introduction and Setup
-
Port and Vulnerability Scanning
- Coding a simple port scanner
- Adding raw input to our port scanner
- Scanning the first 1,000 ports
- Coding an advanced port scanner - Part 1
- Coding an advanced port scanner - Part 2
- Finishing and testing our scanner
- Configuring IP address and installing Metasploitable
- Returning banner from open port
- Coding a vulnerability scanner - Part 1
- Coding a vulnerability scanner - Part 2
- SSH and FTP Attacks
- Password Cracking
-
Sniffers, Flooders and Spoofers
- Changing MAC address manually
- Coding MAC address changer
- Theory behind ARP spoofing
- Crafting malicious ARP packet
- Coding ARP spoofer
- Forwarding packets and restoring ARP tables
- Spoofing our IP address and sending message with TCP payload
- Running SynFlooder with changed source IP address
- Getting source and destination MAC address from received packets
- Sniffing FTP username and password - Part 1
- Sniffing FTP username and password - Part 2
- Getting passwords from HTTP websites
- Coding DNS Spoofer
- Network Analysis
-
Multi-functioning Reverse Shell
- Theory behind socket programming
- Wine and Pyinstaller installation
- Setting up listener
- Establishing connection between target and server
- Implementing send and receive functions
- Executing commands on target system
- Importing JSON library to parse data
- Converting Python backdoor to .exe
- Using OS library to change directory
- Downloading and uploading files to target PC
- Hiding our backdoor and creating persistence
- Trying to connect to server every 20 seconds
- Downloading files to target PC
- Capturing screenshot on target PC
- Administrator privilege check
- Starting other programs with our shell
- Running our shell as an image, audio, PDF
- Coding a Keylogger
- Command and Control Center
-
Website Penetration Testing
- Stealing saved wireless passwords
- Saving passwords to a file
- Bruteforcing Gmail
- Bruteforcing any login page - Part 1
- Bruteforcing any login page - Part 2
- Finding hidden directories - Part 1
- Finding hidden directories - Part 2
- Discovering subdomains
- Changing HTTP headers
- Starting basic and digest authentication bruteforcer
- Controlling threads
- Coding run function
- Printing usage and testing our program
- Taking a look at ransomware
Product information
- Title: The Complete Python Hacking Course
- Author(s):
- Release date: May 2023
- Publisher(s): Manning Publications
- ISBN: 10000DIVC202323
You might also like
video
Learn Python and Ethical Hacking from Scratch
Are you intrigued by how hackers hack into any computer system easily? Do you want to …
video
Complete Python Scripting for Automation
Over the last few years, Python has gained immense popularity. The demand for the programming language …
video
Learn Enough Python to be Dangerous: A Tutorial Introduction to Programming with Python
7.5 Hours of Video Instruction In Learn Enough Python to Be Dangerous: A Tutorial Introduction to …
book
Python for DevOps
Much has changed in technology over the past decade. Data is hot, the cloud is ubiquitous, …