Companies Home Search Profile

The Complete Python Hacking Course: Beginner to Advanced

Focused View

Joseph Delgadillo

17:40:35

84 View
  • 1. Ethical Hacking (Preview).mp4
    19:26
  • 2. Welcome to Ethical Hacking.mp4
    05:16
  • 3. Setup and installation.mp4
    11:38
  • 4. Kali Linux Installation.mp4
    17:05
  • 5. Setting up.mp4
    15:06
  • 6. How to use python in Kali linux.mp4
    13:31
  • 1. Coding a simple port scanner.mp4
    15:30
  • 2. Adding raw input to our port scanner.mp4
    09:21
  • 3. Scanning the first 1,000 ports.mp4
    04:46
  • 4. Coding an advanced port scanner part 1.mp4
    13:12
  • 5. Coding an advanced port scanner part 2.mp4
    08:48
  • 6. Finishing and testing our scanner.mp4
    08:55
  • 7. Configuring IP address and installing Metasploitable.mp4
    08:13
  • 8. Returning banner from open port.mp4
    14:45
  • 9. Coding a vulnerability scanner part 1.mp4
    11:55
  • 10. Coding a vulnerability scanner part 2.mp4
    07:19
  • 1. Automating SSH login part 1.mp4
    09:54
  • 2. Automating SSH login part 2.mp4
    09:20
  • 3. Testing our SSH login program.mp4
    08:34
  • 4. Coding a SSH brute-forcer.mp4
    10:37
  • 5. Executing commands on target after brute-forcing SSH.mp4
    10:09
  • 6. Anonymous FTP login attack.mp4
    09:53
  • 7. Username & password list attack on FTP.mp4
    17:32
  • 1. SHA256, SHA512, MD5.mp4
    08:36
  • 2. Cracking SHA1 hash with online dictionary.mp4
    16:40
  • 3. Getting password from MD5 hash.mp4
    13:22
  • 4. Cracking crypt passwords with salt.mp4
    24:02
  • 1. Changing MAC address manually.mp4
    08:33
  • 2. Coding MAC address changer.mp4
    16:56
  • 3. Theory behind ARP spoofing.mp4
    04:42
  • 4. Crafting malicious ARP packet.mp4
    19:26
  • 5. Coding ARP spoofer.mp4
    13:31
  • 6. Forwarding packets and restoring ARP tables.mp4
    08:04
  • 7. Spoofing our IP address and sending message with TCP payload.mp4
    12:00
  • 8. Running SynFlooder with changed source IP address.mp4
    11:20
  • 9. Getting source and destination MAC address from received packets.mp4
    24:45
  • 10. Sniffing FTP username and password part 1.mp4
    08:09
  • 11. Sniffing FTP username and password part 2.mp4
    12:09
  • 12. Getting passwords from HTTP websites.mp4
    14:01
  • 1. Cloning any webpage.mp4
    10:36
  • 2. Printing DNS queries.mp4
    09:57
  • 3. Redirecting response to cloned page.mp4
    16:44
  • 4. Setting IP table rules and running DNS spoofer.mp4
    10:35
  • 1. Analyzing Ethernet header.mp4
    16:07
  • 2. Analyzing IP header part 1.mp4
    10:24
  • 3. Analyzing IP header part 2.mp4
    25:34
  • 4. Analyzing TCP header.mp4
    15:13
  • 5. Analyzing UDP header.mp4
    13:20
  • 1. Theory behind socket programming.mp4
    07:20
  • 2. Wine and Pyinstaller installation.mp4
    07:41
  • 3. Setting up listener.mp4
    08:17
  • 4. Establishing connection between target and server.mp4
    06:31
  • 5. Implementing send & receive functions.mp4
    11:28
  • 6. Executing commands on target system.mp4
    11:43
  • 7. Importing JSON library to parse data.mp4
    08:19
  • 8. Converting Python backdoor to .exe.mp4
    08:14
  • 9. Using OS library to change directory.mp4
    09:58
  • 10. Downloading & uploading files to target PC.mp4
    19:07
  • 11. Hiding our backdoor and creating persistence.mp4
    13:49
  • 12. Trying to connect to server every 20 seconds.mp4
    07:52
  • 13. Downloading files to target PC.mp4
    11:49
  • 14. Capturing screenshot on target PC.mp4
    23:04
  • 15. Administrator privilege check.mp4
    08:14
  • 16. Starting other programs with our shell.mp4
    10:43
  • 17. Running our shell as an image, audio, PDF.mp4
    20:05
  • 1. Installing Pynput.mp4
    06:19
  • 2. Printing space character.mp4
    08:48
  • 3. Calling timer on our keylogger.mp4
    09:56
  • 4. Adding keylogger to our backdoor.mp4
    12:58
  • 1. What is a threaded server.mp4
    05:05
  • 2. Accepting connections with a thread.mp4
    13:11
  • 3. Managing multiple sessions.mp4
    08:39
  • 4. Testing threaded server with Windows 10 target.mp4
    09:04
  • 5. Fixing Q command.mp4
    11:11
  • 6. Coding exit function.mp4
    13:50
  • 7. Attacking multiple targets and gathering botnet.mp4
    16:26
  • 1. Stealing saved wireless passwords.mp4
    21:55
  • 2. Saving passwords to a file.mp4
    03:02
  • 3. Bruteforcing Gmail.mp4
    10:13
  • 4. Bruteforcing any login page part 1.mp4
    12:59
  • 5. Bruteforcing any login page part 2.mp4
    10:07
  • 6. Finding hidden directories part 1.mp4
    05:10
  • 7. Finding hidden directories part 2.mp4
    06:36
  • 8. Discovering subdomains.mp4
    11:31
  • 9. Changing HTTP headers.mp4
    13:55
  • 10. Starting basic and digest authentication bruteforcer.mp4
    10:23
  • 11. Controlling threads.mp4
    08:34
  • 12. Coding run function.mp4
    10:06
  • 13. Printing usage and testing our program.mp4
    12:33
  • 14. Taking a look at ransomware.mp4
    08:19
  • Description


    Learn ethical hacking, penetration testing and network security while working on Python coding projects!

    What You'll Learn?


    • Ethical Hacking
    • Python Programming
    • Penetration Testing
    • Network Security
    • Port and Vulnerability Scanning
    • SSH and FTP Attacks
    • Password Cracking
    • Sniffers, Flooders and Spoofers
    • DNS Spoofing
    • Network Analysis
    • Multi-functioning Reverse Shell

    Who is this for?


  • Python developers interested in ethical hacking and network security.
  • Students interested in learning Python, a powerful scripting language.
  • What You Need to Know?


  • A basic understanding of ethical hacking related concepts.
  • An eager and open mind!
  • More details


    Description

    If you would like to master ethical hacking while working on practical Python coding projects, you are going to LOVE this course! Learn Python hacking, ethical hacking, penetration testing, cybersecurity, and more with over 17 hours of HD video tutorials! This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. We will begin with coding basic port and vulnerability scanning tools, move onto SSH, FTP, and spoofing attacks, take a look at network analysis, and finish up with coding a reverse shell, command and control center, and several website penetration testing tools. Upon completing this course, you will be prepared for a job in the cybersecurity industry.


    8 Coding Projects in the course:

    • Port and vulnerability scanner

    • SSH brute-forcer

    • MAC address changer

    • ARP spoofer

    • DNS spoofer

    • Multi-functioning reverse shell

    • Keylogger

    • Command and control center


    Topics covered in the course:

    • Introduction and setup

    • Port and vulnerability scanning

    • SSH and FTP attacks

    • Password cracking

    • Sniffers, flooders and spoofers

    • DNS spoofing

    • Network analysis

    • Coding a multi-functioning reverse shell

    • Keyloggers

    • Command and control center

    • Website penetration testing


    Still not sold? Check out a few of the awesome reviews this course has received from customers:

    • "This course was very helpful to me. It taught me to actually continue coding. I used to try to learn using tutorials but I would lose interest quickly. This course has me writing code over and over to get the feel of the syntax and gives me a better understanding of how coding actually works. Thanks!"

    • "What a great course!! It helped to give me a deep understanding of many topics about my current CEH Certification. Thank you very much!"

    • "The course is very well explained, projects are being developed and showing how they can be improved. I particularly liked the section dedicated to the reverse shell, I learned a lot. Thank you Joseph for the course."


    Who this course is for:

    • Python developers interested in ethical hacking and network security.
    • Students interested in learning Python, a powerful scripting language.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Joseph Delgadillo
    Joseph Delgadillo
    Instructor's Courses
    Joseph Delgadillo is the founder of JTD Courses, an education technology company. He has been active in the online learning industry since 2015 and has worked with several prominent companies. As of 2023, over 1 million students across the globe have enrolled in his courses covering network security, Python programming, web development and more.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 90
    • duration 17:40:35
    • Release Date 2023/09/10