Python & Ethical Hacking for Cyber Security UPDATED

Advance your career in cyber security by learning how to use python for ethical hacking: From Kali Linux installation to basic scripts and coding your own tools!

Beginner 4(1 Ratings) 5 Students enrolled
Created by Online Courses Learn Online, On Your Schedule | Firste Last updated Fri, 15-Jul-2022 English
What will i learn?
  • • 85+ videos on Python programming & ethical hacking
  • • Install hacking lab & needed software (on Windows, OS X and Linux) • Learn 2 topics at the same time - Python programming & Ethical Hacking • Start from 0 up to a high-intermediate level • Learn by example, by writing exciting programs
  • • Model problems, design solutions & implement them using Python • Write programs in Python 3 • Write cross platform programs that work on Windows, OS X & Linux
  • • Have a deep understanding on how computer systems work • Have a strong base & use the skills learned to write any program even if its not related to hacking • Understand what is Hacking, what is Programming, and why are they related
  • • Design a testing lab to practice hacking & programming safely • Interact & use Linux terminal • Understand what MAC address is & how to change it
  • • Write a python program to change MAC address • Use Python modules and libraries • Understand Object Oriented Programming
  • • Write object oriented programs • Model & design extendable programs • Write a program to discover devices connected to the same network
  • • Read, analyse & manipulate network packets • Understand & interact with different network layers such as ARP, DNS, HTTP ....etc • Write a program to redirect the flow of packets in a network (arp spoofer) • Write a packet sniffer to filter interesting data such as usernames and passwords • Write a program to redirect DNS requests (DNS Spoofer) • Intercept and modify network packets on the fly • Write a program to replace downloads requested by any computer on the network • Analyze & modify HTTP requests and responses • Inject code in HTML pages loaded by any computer on the same network • Downgrade HTTPS to HTTP • Write a program to detect ARP Spoofing attacks • Write payloads to download a file, execute command, download & execute, download execute & report .....etc • Use sockets to send data over TCP • Send data reliably over TCP • Write client-server programs • Write a backdoor that works on Windows, OS X and Linux • Implement cool features in the backdoor such as file system access, upload and download files and persistence • Write a remote keylogger that can register all keystrikes and send them by Email • Interact with files using python (read, write & modify) • Convert python programs to binary executables that work on Windows, OS X and Linux • Convert malware to torjans that work and function like other file types like an image or a PDF • Bypass Anti-Virus Programs • Understand how websites work, the technologies used and how to test them for weaknesses • Send requests to websites and analyze responses • Write a program that can discover hidden paths in a website • Write a program that can map a website and discover all links, subdomains, files and directories • Extract and submit forms from python • Run dictionary attacks and guess login information on login pages • Analyze HTML using Python • Interact with websites using Python • Write a program that can discover vulnerabilities in websites

Curriculum for this course
90 Lessons 17:26:01 Hours
1 Introduction to Python for ethical hacking!
5 Lessons 01:02:50 Hours
  • 1. Welcome to Python for ethical hacking! 00:05:17
  • 2. VirtualBox 6.0.4 installation 00:11:42
  • 3. Kali Linux 2019.1a installation 00:17:08
  • 4. Guest additions installation 00:15:09
  • 5. Python in Kali terminal 00:13:34
  • 6. Making simple port scanner 00:15:34
  • 7. Adding raw_input to our port scanner 00:09:25
  • 8. Scanning first 1000 ports 00:04:48
  • 9. Coding advance port scanner - part 1 00:13:14
  • 10. Coding advance port scanner - part 2 00:08:52
  • 11. Finishing and testing advance port scanner 00:09:01
  • 12. Configuring IP address and installing Metasploitable 00:08:15
  • 13. Returning banner from open port 00:14:47
  • 14. Coding vulnerability scanner - part 1 00:11:58
  • 15. Coding vulnerability scanner - part 2 00:07:22
  • 16. Automating SSH login - part 1 00:09:56
  • 17. Automating SSH login - part 2 00:09:22
  • 18. Testing SSH login program 00:08:38
  • 19. Coding SSH Bruteforcer 00:10:39
  • 20. Executing command on target after brute forcing SSH 00:10:12
  • 21. Anonymous FTP login attack 00:09:56
  • 22. Username & password list attack on FTP 00:17:33
  • 23. SHA256, SHA512 and MD5 00:08:38
  • 24. Cracking SHA1 hash with online dictionary 00:16:42
  • 25. Getting password from MD5 hash 00:13:27
  • 26. Cracking crypt password with Salt 00:24:04
  • 27. Changing MAC address manually 00:08:36
  • 28. Coding MAC changer 00:17:01
  • 29. Theory behind ARP spoofing 00:04:44
  • 30. Crafting malicious ARP packet 00:19:29
  • 31. Coding ARP spoofer 00:13:34
  • 32. Forwarding packets and restoring ARP tables 00:08:08
  • 33. Spoofing our IP address and sending message with TCP payload 00:12:03
  • 34. Running SynFlooder with changed source IP address 00:11:23
  • 35. Getting source and destination MAC address from received packets 00:24:47
  • 36. Sniffing FTP username and password - part 1 00:08:13
  • 37. Sniffing FTP username and password - part 2 00:12:13
  • 38. Getting passwords from HTTP websites 00:14:05
  • 39. Cloning any webpage 00:10:38
  • 40. Printing DNS queries 00:10:02
  • 41. Redirecting response to cloned page 00:16:49
  • 42. Setting IP table rules and running DNS spoofer 00:10:41
  • 43. Analyzing Ethernet header 00:16:11
  • 44. Analyzing IP header - part 1 00:10:28
  • 45. Analyzing IP header - part 2 00:25:36
  • 46. Analyzing TCP header 00:15:16
  • 47. Analyzing UDP header 00:13:22
  • 48. Theory behind socket programming 00:07:21
  • 49. Wine & Pyinstaller installation 00:07:46
  • 50. Setting up listener 00:08:20
  • 51. Establishing connection between target and server 00:06:33
  • 52. Implementing send & recv functions 00:11:31
  • 53. Executing commands on target system 00:11:45
  • 54. Importing JSON library to parse data 00:08:22
  • 55. Converting Python backdoor to .exe 00:08:16
  • 56. Using OS library to change directory 00:10:01
  • 57. Downloading & uploading files to target PC 00:19:08
  • 58. Hiding our backdoor and creating persistence 00:13:51
  • 59. Trying to connect to server every 20 seconds 00:07:56
  • 60. Downloading files to target PC 00:11:52
  • 61. Capturing screenshot on target PC 00:23:09
  • 62. Administrator privilege check 00:08:16
  • 63. Starting other programs with our shell 00:10:48
  • 64. Running our shell as an image, audio, Pdf... 00:20:10
  • 65. Installing Pynput 00:06:22
  • 66. Printing space character 00:08:51
  • 67. Calling timer on our keylogger 00:09:59
  • 68. Adding keylogger to our backdoor 00:13:01
  • 69. What is a threaded server 00:05:08
  • 70. Accepting connections with a thread 00:13:15
  • 71. Managing multiple sessions 00:08:42
  • 72. Testing threaded server with Windows 10 target 00:09:06
  • 73. Fixing Q command 00:11:15
  • 74. Coding exit function 00:13:54
  • 75. Attacking multiple targets and gathering botnet 00:16:30
  • 76. Stealing saved wireless passwords 00:22:01
  • 77. Saving passwords to a file 00:03:04
  • 78. Bruteforcing Gmail 00:10:16
  • 79. Bruteforcing any login page - part 1 00:13:02
  • 80. Bruteforcing any login page - part 2 00:10:12
  • 81. Finding hidden directories - part 1 00:05:13
  • 82. Finding hidden directories - part 2 00:06:41
  • 83. Discovering subdomains 00:11:34
  • 84. Changing HTTP headers 00:14:01
  • 85. Starting basic and digest authentication bruteforcer 00:10:26
  • 86. Controlling threads 00:08:38
  • 87. Coding run function 00:10:11
  • 88. Printing usage and testing our program 00:12:39
  • 89. Taking a look at ransomware 00:08:23
  • 90. Bonus Lectures. Enjoy the Benefits
Requirements
  • All Levels. No prior Python knowledge is required.
  • You will need a computer, Laptop, Tablet or a smartphone.
  • All devices work: Mac or PC, iOS or Android
  • All you need is YOU and YOU! Just have an open mind and willingness to learn and implement
+ View more
Description

Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

Advance your career in cyber security by learning how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools!

 

Would you like to learn how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools because this knowledge can be useful for you to advance your ethical hacking career?

In this course you will learn:

  • Python for ethical hacking!
  • Port and vulnerability scanning
  • SSH & FTP attacks
  • Password cracking
  • Sniffers, flooders, and spoofers
  • Coding DNS spoofer
  • Network analysis
  • and much, much more…

This course was designed for total beginners and there is no particular knowledge requirement.

In short, this is the one stop shop for everything you need to become a Python Ethical Hacker Expert.

With 85+ Long, but Laser Targeted Videos, over 40 packed hours, we will leave no stone unturned.

Are you ready to start your path to becoming a Python Ethical Hacker, and learn one of employer's most demanded skill for 2021 and beyond?

 

This is by far the most comprehensive, yet condensed and straight-forward, course bundle for Python Ethical Hacking! Whether you have never had any knowledge on Python before, already know some basic skills, or want to learn about the advanced features of Python, this is the course you are looking for!

 

Don’t miss this Limited Time Offer. ACT NOW!

 

You will Learn by Practice:

By the end of this Unique Course, you will go from #Newbie to #Advanced as a #Python_Ethical_Hacker. Here is what you’ll learn:

 

1 Introduction to Python for ethical hacking!

<!--[if !supportLists]-->1.  <!--[endif]-->Welcome to Python for ethical hacking!FREE PREVIEW

<!--[if !supportLists]-->2.  <!--[endif]-->VirtualBox 6.0.4 installationFREE PREVIEW

<!--[if !supportLists]-->3.  <!--[endif]-->Kali Linux 2019.1a installationFREE PREVIEW

<!--[if !supportLists]-->4.  <!--[endif]-->Guest additions installation

<!--[if !supportLists]-->5.  <!--[endif]-->Python in Kali terminal

 

2 Port and vulnerability scanning

<!--[if !supportLists]-->6.  <!--[endif]-->Making simple port scanner

<!--[if !supportLists]-->7.  <!--[endif]-->Adding raw_input to our port scanner

<!--[if !supportLists]-->8.  <!--[endif]-->Scanning first 1000 ports

<!--[if !supportLists]-->9.  <!--[endif]-->Coding advance port scanner - part 1

<!--[if !supportLists]-->10.         <!--[endif]-->Coding advance port scanner - part 2

<!--[if !supportLists]-->11.         <!--[endif]-->Finishing and testing advance port scanner

<!--[if !supportLists]-->12.         <!--[endif]-->Configuring IP address and installing Metasploitable

<!--[if !supportLists]-->13.         <!--[endif]-->Returning banner from open port

<!--[if !supportLists]-->14.         <!--[endif]-->Coding vulnerability scanner - part 1

<!--[if !supportLists]-->15.         <!--[endif]-->Coding vulnerability scanner - part 2

 

3 SSH & FTP attacks

<!--[if !supportLists]-->16.         <!--[endif]-->Automating SSH login - part 1

<!--[if !supportLists]-->17.         <!--[endif]-->Automating SSH login - part 2

<!--[if !supportLists]-->18.         <!--[endif]-->Testing SSH login program

<!--[if !supportLists]-->19.         <!--[endif]-->Coding SSH Bruteforcer

<!--[if !supportLists]-->20.         <!--[endif]-->Executing command on target after brute forcing SSH

<!--[if !supportLists]-->21.         <!--[endif]-->Anonymous FTP login attack

<!--[if !supportLists]-->22.         <!--[endif]-->Username & password list attack on FTP

 

4 Password cracking

<!--[if !supportLists]-->23.         <!--[endif]-->SHA256, SHA512 and MD5

<!--[if !supportLists]-->24.         <!--[endif]-->Cracking SHA1 hash with online dictionary

<!--[if !supportLists]-->25.         <!--[endif]-->Getting password from MD5 hash

<!--[if !supportLists]-->26.         <!--[endif]-->Cracking crypt password with Salt

 

5 Sniffers, flooders, and spoofers

<!--[if !supportLists]-->27.         <!--[endif]-->Changing MAC address manually

<!--[if !supportLists]-->28.         <!--[endif]-->Coding MAC changer

<!--[if !supportLists]-->29.         <!--[endif]-->Theory behind ARP spoofing

<!--[if !supportLists]-->30.         <!--[endif]-->Crafting malicious ARP packet

<!--[if !supportLists]-->31.         <!--[endif]-->Coding ARP spoofer

<!--[if !supportLists]-->32.         <!--[endif]-->Forwarding packets and restoring ARP tables

<!--[if !supportLists]-->33.         <!--[endif]-->Spoofing our IP address and sending message with TCP payload

<!--[if !supportLists]-->34.         <!--[endif]-->Running SynFlooder with changed source IP address

<!--[if !supportLists]-->35.         <!--[endif]-->Getting source and destination MAC address from received packets

<!--[if !supportLists]-->36.         <!--[endif]-->Sniffing FTP username and password - part 1

<!--[if !supportLists]-->37.         <!--[endif]-->Sniffing FTP username and password - part 2

<!--[if !supportLists]-->38.         <!--[endif]-->Getting passwords from HTTP websites

 

6 Coding DNS spoofer

<!--[if !supportLists]-->39.         <!--[endif]-->Cloning any webpage

<!--[if !supportLists]-->40.         <!--[endif]-->Printing DNS queries

<!--[if !supportLists]-->41.         <!--[endif]-->Redirecting response to cloned page

<!--[if !supportLists]-->42.         <!--[endif]-->Setting IP table rules and running DNS spoofer

 

7 Network analysis

<!--[if !supportLists]-->43.         <!--[endif]-->Analyzing Ethernet header

<!--[if !supportLists]-->44.         <!--[endif]-->Analyzing IP header - part 1

<!--[if !supportLists]-->45.         <!--[endif]-->Analyzing IP header - part 2

<!--[if !supportLists]-->46.         <!--[endif]-->Analyzing TCP header

<!--[if !supportLists]-->47.         <!--[endif]-->Analyzing UDP header

 

8 Multi functioning reverse shell

<!--[if !supportLists]-->48.         <!--[endif]-->Theory behind socket programming

<!--[if !supportLists]-->49.         <!--[endif]-->Wine & Pyinstaller installation

<!--[if !supportLists]-->50.         <!--[endif]-->Setting up listener

<!--[if !supportLists]-->51.         <!--[endif]-->Establishing connection between target and server

<!--[if !supportLists]-->52.         <!--[endif]-->Implementing send & recv functions

<!--[if !supportLists]-->53.         <!--[endif]-->Executing commands on target system

<!--[if !supportLists]-->54.         <!--[endif]-->Importing JSON library to parse data

<!--[if !supportLists]-->55.         <!--[endif]-->Converting Python backdoor to .exe

<!--[if !supportLists]-->56.         <!--[endif]-->Using OS library to change directory

<!--[if !supportLists]-->57.         <!--[endif]-->Downloading & uploading files to target PC

<!--[if !supportLists]-->58.         <!--[endif]-->Hiding our backdoor and creating persistence

<!--[if !supportLists]-->59.         <!--[endif]-->Trying to connect to server every 20 seconds

<!--[if !supportLists]-->60.         <!--[endif]-->Downloading files to target PC

<!--[if !supportLists]-->61.         <!--[endif]-->Capturing screenshot on target PC

<!--[if !supportLists]-->62.         <!--[endif]-->Administrator privilege check

<!--[if !supportLists]-->63.         <!--[endif]-->Starting other programs with our shell

<!--[if !supportLists]-->64.         <!--[endif]-->Running our shell as an image, audio, Pdf...

 

9 Coding keylogger

<!--[if !supportLists]-->65.         <!--[endif]-->Installing Pynput

<!--[if !supportLists]-->66.         <!--[endif]-->Printing space character

<!--[if !supportLists]-->67.         <!--[endif]-->Calling timer on our keylogger

<!--[if !supportLists]-->68.         <!--[endif]-->Adding keylogger to our backdoor

 

10 Command and control center

<!--[if !supportLists]-->69.         <!--[endif]-->What is a threaded server

<!--[if !supportLists]-->70.         <!--[endif]-->Accepting connections with a thread

<!--[if !supportLists]-->71.         <!--[endif]-->Managing multiple sessions

<!--[if !supportLists]-->72.         <!--[endif]-->Testing threaded server with Windows 10 target

<!--[if !supportLists]-->73.         <!--[endif]-->Fixing Q command

<!--[if !supportLists]-->74.         <!--[endif]-->Coding exit function

<!--[if !supportLists]-->75.         <!--[endif]-->Attacking multiple targets and gathering botnet

 

11 Website penetration testing with Python

<!--[if !supportLists]-->76.         <!--[endif]-->Stealing saved wireless passwords

<!--[if !supportLists]-->77.         <!--[endif]-->Saving passwords to a file

<!--[if !supportLists]-->78.         <!--[endif]-->Bruteforcing Gmail

<!--[if !supportLists]-->79.         <!--[endif]-->Bruteforcing any login page - part 1

<!--[if !supportLists]-->80.         <!--[endif]-->Bruteforcing any login page - part 2

<!--[if !supportLists]-->81.         <!--[endif]-->Finding hidden directories - part 1

<!--[if !supportLists]-->82.         <!--[endif]-->Finding hidden directories - part 2

<!--[if !supportLists]-->83.         <!--[endif]-->Discovering subdomains

<!--[if !supportLists]-->84.         <!--[endif]-->Changing HTTP headers

<!--[if !supportLists]-->85.         <!--[endif]-->Starting basic and digest authentication bruteforcer

<!--[if !supportLists]-->86.         <!--[endif]-->Controlling threads

<!--[if !supportLists]-->87.         <!--[endif]-->Coding run function

<!--[if !supportLists]-->88.         <!--[endif]-->Printing usage and testing our program

<!--[if !supportLists]-->89.         <!--[endif]-->Taking a look at ransomware

 

12 Additional Content: Grand Finale

<!--[if !supportLists]-->90.         <!--[endif]-->Bonus Lectures. Enjoy the Benefits

 

You could also end up using these skills in your work for Your #Clients, and much more.

 

You'll Also Get:

* Lifetime Access to course updates

So wait no more! Learn Python Ethical Hacking and Cyber Security, increase your knowledge, become a Python Expert and advance your career all in a fun and practical way!

 

We really hope you find this course valuable, but either way, please leave a review and share your experience...

 

+ View more
Other related courses
33:50:11 Hours
5 5 $199 $2
14:14:43 Hours
Updated Fri, 15-Jul-2022
5 5 $199 $2
27:28:08 Hours
5 5 $199 $2
22:43:57 Hours
4 5 $199 $2
About the instructor
  • 24 Reviews
  • 33 Students
  • 87 Courses
+ View more
Online Courses - Learn Online, On Your Schedule | Firste

Firste Academy is an online learning platform with online top best online courses taught by the world's best instructors. Personalized, on-demand e-learning in programming, marketing, data science, development and more.

Student feedback
4
Average rating
  • 0%
  • 0%
  • 0%
  • 100%
  • 0%
Reviews
  • Sat, 23-Jul-2022
    this course was amazing i just completed this course in 3 mouths this is amazing journey for me i have learnt many new things. many thanks to zaid and his team they helped alot. i already purchased zaid other courses as well hope so i will learn more things.
$2 $199
Buy now
Includes:
  • 17:26:01 Hours On demand videos
  • 90 Lessons
  • Full lifetime access
  • Access on mobile and tv