The Complete Python Hacking Course

Video description

Master ethical hacking while working on practical Python coding projects. Learn Python hacking skills, ethical hacking principles, penetration testing, cybersecurity, and more with over 17 hours of video tutorials. Designed for those with intermediate- to advanced-level understanding of ethical hacking, this course is still taught in a step-by-step, beginner-friendly method. We begin with coding basic port and vulnerability scanning tools; move onto SSH, FTP, and spoofing attacks; take a look at network analysis; and finish up with coding a reverse shell, command and control center, and several website penetration testing tools. Upon completing this course, you will be prepared for a job in the cybersecurity industry.

Learn all these skills while completing eight coding projects:

  • Port and vulnerability scanner
  • SSH brute-forcer
  • MAC address changer
  • ARP spoofer
  • DNS spoofer
  • Multi-functioning reverse shell
  • Keylogger
  • Command and control center


Distributed by Manning Publications

This course was created independently by Joseph Delgadillo and is distributed by Manning through our exclusive liveVideo platform.



About the Technology


About the Video


What's Inside
  • Ethical Hacking
  • Penetration Testing
  • Network Security
  • Port and Vulnerability Scanning
  • SSH and FTP Attacks
  • Password Cracking
  • Sniffers, Flooders and Spoofers
  • DNS Spoofing
  • Network Analysis
  • Multi-functioning Reverse Shell


About the Reader
Basic understanding of ethical hacking and Python programming

About the Author

Joseph Delgadillo is the founder of JTD Courses, an education technology company. He has been active in the online learning industry since 2015 and has worked with several prominent companies. As of 2023, over one million students across the globe have enrolled in his courses covering network security, Python programming, web development and more.



Quotes

Table of contents

  1. Introduction and Setup
    1. Welcome to Python for ethical hacking!
    2. VirtualBox installation
    3. Kali Linux installation
    4. Adding Guest Additions
    5. Python in Kali terminal
  2. Port and Vulnerability Scanning
    1. Coding a simple port scanner
    2. Adding raw input to our port scanner
    3. Scanning the first 1,000 ports
    4. Coding an advanced port scanner - Part 1
    5. Coding an advanced port scanner - Part 2
    6. Finishing and testing our scanner
    7. Configuring IP address and installing Metasploitable
    8. Returning banner from open port
    9. Coding a vulnerability scanner - Part 1
    10. Coding a vulnerability scanner - Part 2
  3. SSH and FTP Attacks
    1. Automating SSH login - Part 1
    2. Automating SSH login - Part 2
    3. Testing our SSH login program
    4. Coding a SSH brute-forcer
    5. Executing commands on target after brute-forcing SSH
    6. Anonymous FTP login attack
    7. Username and password list attack on FTP
  4. Password Cracking
    1. SHA256, SHA512, MD5
    2. Cracking SHA1 hash with online dictionary
    3. Getting password from MD5 hash
    4. Cracking crypt passwords with salt
  5. Sniffers, Flooders and Spoofers
    1. Changing MAC address manually
    2. Coding MAC address changer
    3. Theory behind ARP spoofing
    4. Crafting malicious ARP packet
    5. Coding ARP spoofer
    6. Forwarding packets and restoring ARP tables
    7. Spoofing our IP address and sending message with TCP payload
    8. Running SynFlooder with changed source IP address
    9. Getting source and destination MAC address from received packets
    10. Sniffing FTP username and password - Part 1
    11. Sniffing FTP username and password - Part 2
    12. Getting passwords from HTTP websites
  6. Coding DNS Spoofer
    1. Cloning any webpage
    2. Printing DNS queries
    3. Redirecting response to cloned page
    4. Setting IP table rules and running DNS spoofer
  7. Network Analysis
    1. Analyzing Ethernet header
    2. Analyzing IP header - Part 1
    3. Analyzing IP header - Part 2
    4. Analyzing TCP header
    5. Analyzing UDP header
  8. Multi-functioning Reverse Shell
    1. Theory behind socket programming
    2. Wine and Pyinstaller installation
    3. Setting up listener
    4. Establishing connection between target and server
    5. Implementing send and receive functions
    6. Executing commands on target system
    7. Importing JSON library to parse data
    8. Converting Python backdoor to .exe
    9. Using OS library to change directory
    10. Downloading and uploading files to target PC
    11. Hiding our backdoor and creating persistence
    12. Trying to connect to server every 20 seconds
    13. Downloading files to target PC
    14. Capturing screenshot on target PC
    15. Administrator privilege check
    16. Starting other programs with our shell
    17. Running our shell as an image, audio, PDF
  9. Coding a Keylogger
    1. Installing Pynput
    2. Printing space character
    3. Calling timer on our keylogger
    4. Adding a keylogger to our backdoor
  10. Command and Control Center
    1. What is a threaded server?
    2. Accepting connections with a thread
    3. Managing multiple sessions
    4. Testing threaded server with Windows 10 target
    5. Fixing Q command
    6. Coding exit function
    7. Attacking multiple targets and gathering botnet
  11. Website Penetration Testing
    1. Stealing saved wireless passwords
    2. Saving passwords to a file
    3. Bruteforcing Gmail
    4. Bruteforcing any login page - Part 1
    5. Bruteforcing any login page - Part 2
    6. Finding hidden directories - Part 1
    7. Finding hidden directories - Part 2
    8. Discovering subdomains
    9. Changing HTTP headers
    10. Starting basic and digest authentication bruteforcer
    11. Controlling threads
    12. Coding run function
    13. Printing usage and testing our program
    14. Taking a look at ransomware

Product information

  • Title: The Complete Python Hacking Course
  • Author(s): Joseph Delgadillo
  • Release date: May 2023
  • Publisher(s): Manning Publications
  • ISBN: 10000DIVC202323