Development Online Course by Udemy, On Sale Here
Start from 0 & learn both topics simultaneously from scratch by writing 20+ hacking programs
An excellent training about Programming Languages
Learn Python & Ethical Hacking From Scratch
Welcome to my comprehensive course on python programming and ethical hacking. The course assumesyou have NOprior knowledge in any of these topics, and by the end of it you’ll be at a high intermediate level being able to combine both of these skills to write python programs to hack into computer systems exactly the same way that black hat hackers do. That’s not all, you’ll also be able to use the programming skills you learn to write any program even if it has nothing to do with hacking. Thiscourse ishighly practical but it won’t neglect the theory, we’ll start with basics of ethical hacking and python programming and installing the needed software. Then we’ll dive and start programming straight away. You’ll learn everything by example, by writing useful hacking programs, no boring dry programming lectures. The course is divided into a number of sections, each aims to achieve a specific goal, the goal is usually to hack into a certain system! We’ll start by learning how this system work and its weaknesses, then you’ll lean how to write a python program to exploit these weaknesses and hack the system. As we write the program I will teach you python programming from scratch covering one topic at a time. By the end of the course you’re going to have a number of ethical hacking programs written by yourself (see below) from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools and the list goes on. You’ll also have a deep understanding on how computer systems work, how to model problems, design an algorithm to solve problems and implement the solution using python. As mentioned in this course you will learn both ethical hacking and programming at the same time, here aresomeof the topics that will be covered in the course: Programming topics: Writing programs for python2and 3.Using modules and libraries. Variables, types. etc. Handling user input. Reading and writing files. Functions. Loops. Data structures. Regex. Desiccation making. Recursion. Threading. Object oriented programming. Packet manipulation using scapy. Netfilterqueue. Socket programming. String manipulation. Exceptions. Serialisation. Compiling programs to binary executables. Sending & receiving HTTP requests. Parsing HTML.+ more! Hacking topics: Basics of network hacking / penetration testing. Changing MAC address & bypassing filtering. Network mapping. ARP Spoofing – redirect the flow of packets in a network. DNS Spoofing -redirect requests from one website to another. Spying on any client connected to the network – see usernames, passwords, visited urls. etc. Inject code in pages loaded by any computer connected to the same network. Replace files on the fly as they get downloaded by any computer on the same network. Detect ARP spoofing attacks. Bypass HTTPS. Create malware for Windows, OS X and Linux. Create trojans for Windows, OS X and Linux. Hack Windows, OS X and Linux using custom backdoor. Bypass Anti-Virus programs. Use fake login prompt to steal credentials. Display fake updates. Use own keylogger to spy on everything typed on a Windows & Linux. Learn the basics of website hacking / penetration testing. Discover subdomains. Discover hidden files and directories in a website. Run wordlist attacks to guess login information. Discover and exploit XSS vulnerabilities. Discover weaknesses in websites using own vulnerability scanner. Programs you’ll build in this course: You’ll learn all the aboveby implementing the following hacking programsmac changer – changesMAC Address to anything we want. network scanner – scans network and discoversthe IP and MAC address ofall connectedclients. arp spoofer – runs an arp spoofing attack to redirect the flow of packets in the network allowing us to intercept data. packet sniffer – filters intercepteddata and shows usernames, passwords, visited links. etcdns spoofer – redirects DNS requests, eg: redirects requests to from one domain to another. file interceptor – replaces intercepted files with any file we want. code injector – injects code in interceptedHTML pages. arpspoof detector – detects ARP spoofing attacks. execute command payload – executes a system command on the computer it gets executed on. execute and report payload -executes a system command and reports result via email. download and execute payload – downloads a file and executes it on target system. download execute and report payload – downloads a file, executes it, and reports result by email. reverse backdoor – gives remote control over the system it gets executed on, allows us toAccess file system. Execute system commands. Download & upload fileskeylogger – records key-strikes and sends them to us by email. crawler – discovers hidden paths on a target website. discover subdomains – discovers subdomains on target website. spider – maps the whole target website and discovers all files, directories and links. guess login – runs a wordlist attack to guess login information. vulnerability scanner – scans a target website for weaknesses and produces a report with all findings.
Udemy is the leading global marketplace for learning and instruction
By connecting students all over the world to the best instructors, Udemy is helping individuals reach their goals and pursue their dreams.
Study anytime, anywhere.
Reviews
There are no reviews yet.