Advanced Hacking With Python
3.1 (110 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,769 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Advanced Hacking With Python to your Wishlist.

Add to Wishlist

Advanced Hacking With Python

Become an advanced hacker now
3.1 (110 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,769 students enrolled
Created by Priyank Gada
Last updated 10/2016
English
Price: Free
Includes:
  • 3 hours on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn Major Hacking Tricks
  • Choose the right path ( ethical )
  • Use proper tools
  • Practical Knowledge on Ethical Hacking
View Curriculum
Requirements
  • Basic Of Ethical hacking
  • Basics About Computers
  • Theory Part of Hacking
Description

This course is developed for people who want to become an ethical hacker professionally . This course will help you to learn practically and contains demonstration of various underground tools and techniques used by hackers.

In this course you will learn :

  • Introduction to ethical hacking
  • footprinting
  • gaining access
  • System hacking
  • Mobile Hacking
  • DDos / Dos
  • and lots more

We will be using the underground tools and techniques that black hat hackers use and we will also try to find solutions on it. 

This course is complete practical and thus needs basic prior knowledge about ethical hacking and basic computer knowledge . Become an ethical hacker with my course now .

Who is the target audience?
  • This Course is meant for people who have basic knowledge of hacking
  • Newbies should join my Ethical Hacking Basics Course first
  • This course is meant for people who know the theory part
Students Who Viewed This Course Also Viewed
Curriculum For This Course
29 Lectures
02:56:39
+
1.0 Introduction
10 Lectures 59:16

How to Build a Hacker's Machine

Hardware :

A hacker's machine doesn't need any special kind of hardware or any special hardware requirements . It just needs a normal mid range machine which can do multi tasking and can run various softwares at a time. It should have decent amount of RAM . I recommend 6+ GB of RAM but 4 GB is also enough.

You also need an external WiFi ( also known as alpha card ) for wifi hacking . ( Important . External is needed )

Software :

A Hacker's Machine should have some basic software installed . I will tell you which softwares you have to install and from where you can get them in later part when we have to use them.

For now you need to install any 64 bit windows operating System and Virtual box / VMware .

My Config:

  • Core i5 3.2 Ghz 
  • 8 GB of RAM
  • 1 TB Hard-disk

Thats Enough for an hacker's machine . I don't have DVD drive ( you can purchase one if you need )

1.1 Machine Configuration
04:09

What is Virtual Box :

  • Virtual box is used to create various virtual machines inside your main computer . It is very useful in ethical hacking.

Why Virtual Box ?

  • I personally prefer virtual box because its small in size and is perfect . There are other softwares like vm ware but i personally use virtual box .
  • Virtual box gives you ability to take your computer and to carry all virtual machines from one computer to other.
1.2 Installing Virtual Box
04:04

Why Windows 8.1

Now according to online research I came to know that most people are using windows 7 and windows 8.1 . Even after the release of Windows 10 , people are still using ( and in love with ) windows 7 . So we are going to create virtual machines ( on which we will practice hacking ) using windows 8.1 and windows 7.

Victim Machine :

  • We are going to perform various attacks on victim's machine . So first we will be creating a virtual machine and installing windows 8.1 on it. You can download windows 8.1 via the given link.
  • I prefer installing 64 bit but you can install 32bit


1.3 Victim Machine - Windows 8.1
10:18

Why Windows 7

Now according to online research I came to know that most people are using windows 7 and windows 8.1 . Even after the release of Windows 10 , people are still using ( and in love with ) windows 7 . So we are going to create virtual machines ( on which we will practice hacking ) using windows 8.1 and windows 7.

Victim Machine :

  • We are going to perform various attacks on victim's machine . So first we will be creating a virtual machine and installing windows 7 on it. You can download windows 7 via the given link.
  • I prefer installing 64 bit but you can install 32bit
1.4 Victim Machine - Windows 7
07:24

Complete the quiz and show your skills

Section 1 : Quiz
6 questions

About this video :

We are installing Ubuntu on virtual box because we will be looking into system hacking in which i will be showing you how to hack linux root password and various other stuffs. So it is essential to install linux on virtual box. I do not have recommend any other linux distort because ubuntu is best for beginners .


1.5 Victim machine - Ubuntu
05:35

Why drivers :

Many times screen resolution changes and you are not able to hear sound . So at this point to fix every problem you need to update drivers on your linux. As linux is mostly Command based , we also need to learn some basic commands . So in this video i will be showing how to fix and update driver problems.

1.6 Victim Machine - Ubuntu - Installing Drivers
08:50

About this lecture :

In this lecture i will show you how to install windows server 2012 . Now many times we will be practicing live hacking on servers . So it is essential to create have our own virtual server. 

You can download windows server iso images form the link given in resources . 

1.7 Victim Machine - Windows Server 2012
06:02

About this lecture :

In this lecture , i will be showing you how to install window XP on virtual machine . Microsoft has stopped giving support for windows XP but still people like and use windows XP . So we will be creating a victim machine and installing windows XP on it.

1.7 - Victim Machine - Windows XP
05:56

What is DVWA :

DVWA is short for damn vulnerable web application . It is used a toolkit which is vulnerable to most attacks . It has various security levels ( you can set security to low / high according to your needs ) . You can practice hacking on DVWA .

About Video :

In this video , i will show you how to properly setup DVWA on your computer to start hacking. I have a separate course on DVWA on my youtube channel ( link in resources ) you can use the videos to practice hacking. 

1.8 Installing DVWA
04:24

About Video :

In this video , i will show you how to use various things to bring the hacker's feeling from within . You can start feeling like a hacker and use hacker's mindset. We have completed section 1 of our course so i thought i should show you something that makes you look like a hacker.


1.9 - Feel Like a Hacker
02:34

Solve the quiz to show your skills 

Section 1 : Quiz 2
2 questions
+
2.0 Foot Printing
13 Lectures 01:09:57

Ping :

Ping command is used to check internet connection ( or connection between two computers ) . In next lecture we will study ping command in detail .

How to use ping command :

  • Press windows + R key 
  • type cmd press ok
  • command : cmd <target>
  • example : cmd www.google.com
2.1 Ping Command
06:48

About lecture :

In this video , priyank gada will show you how to ping a website and baisc ping commands . Ping is very important ( though very small ) command for hackers ( and network admins ) . As this course is for beginners , i thought i should start from basics.

2.2 Basic Ping
03:58

About video :

In this video we will study more about ping utility that comes with windows. We will study how ping works , why it is needed , TTL , RTL , etc .


2.3 Ping Utility Advanced
10:48

What is trace route :

Trace route is a technique in which a hacker finds all the hops between you and the website . Whenever you visit any website , we are hopped between many other nodes.


About video :

In this video , priyank gada will show you how to trace a route and use the tracert command . Understanding the basics of trace route is very important part of ethical hacking.

2.4 Trace Route
13:17

What is Whois records :

While purchasing domain name ( domain name is the name of website i.e. www.google.com ) , purchaser has to give some basic information to the domain provider . So whois scan will find all the information given to the domain provider.


About this video :

In this video , we will perform who.is scan on various website and try to find details about domain providers . I will also show you some counter measures .

2.5 Whois Scan
07:48

NSLookup :

Ever website has its own name servers which are also known as domain name servers. 

About this video :

In this video , we will try to find all records that we can get about domain name servers. We will also look into nslookup command .

2.6 NSLookup
03:53

About Poeple Search :

People search tools are used to find as much information we can get. People search tools can find address , mobile numbers , telephone numbers , etc from name . 

I have added people search tools ( most famous ) in the resources section .

2.7 People Search
05:07

About Blackwidow  :

Blackwidow can be used to crawl a website and download it.


About Video :

In this video , i will show you how to use black widow . You can download black widow from the link in  resources. 

2.9 Black Widow
04:05

About Video :

In this video , i will show you how to use network monitoring tool called alchemey eye which detects any problems ( and movements ) on your network .

2.10 Alchemey Eye
03:21

About video :

In this video , I will show you how to use countrywhois software to find location related information of any IP address. This tool is used by forensics to investigate various things in a cyber crime.

2.11 Contry Whois
01:33

About Video :

In this video , i will show you how to use network tools to find various information about any website.

2.12 Network Tools
01:43

Lets test your skills on Footprinting

Section 2 : Quiz
5 questions

About IP Scanners :

IP scanners are softwares that will help you to find more information about a target machine just by entering an IP address . You can enter a single IP address or a range of IP addresses in the software and just click on scan.


In this video :

In this video , priyank gada shows how to use advanced IP scanner and how to use it to find details about target.

2.13 Advanced IP Scanner
04:55

About Smart whois :

Smart whois is a tool which shows whois result of any IP address , Host or website . It performs whois scan and brings all the details about the website.

About this video :

In this video , i am going to show you how to use smart whois.

2.14 Smart Whois
02:41
+
6.0 System Hacking
1 Lecture 07:36

About this video :

In this video , i will show you how to hack linux root password , user password and other linux passwords . I will also show you how to fix this problem and prevent other hackers from hacking your linux system.

6.1 Linux System Hacking
07:36
+
7.0 Brute Forcing
1 Lecture 09:03

About Brute Force Hacking :

Brute force technique basically means using random strings of passwords ( mainly in series ) for example the hacker might try A AA AB AC AD AE ... AZ BA BB BC BD ... till he can crack password.

About this video :

In this video , i will show you how to use fireforce ( firefox plugin ) to bruteforce any website's login page . I will show you dictionary attack , etc.

7.1 Brute Forcing using Fire Force
09:03
+
13.0 Web Server and Web Applications
1 Lecture 08:20

About Code injection :

Code injection is basically a technique in which a hacker tries to execute commands on the target website. 

About this video :

I am going to demonstrate code injection on DVWA and try to execute some commands on it.

13.1 Code Injection
08:20
+
14.0 Mobile Hacking
3 Lectures 22:27

What is rooting :

Rooting is a technique in which we exploit android and gain high privilege access on any android device . After rooting we can modify various things and we can increase the phone's features .

In this video :

This video is all about rooting . I will show you how to root an android device . I will also show other rooting processes . 

14.1 Rooting
08:00

About this video :

In this video , i am going to show you lock screen lag bug and we are going to exploit the bug and try to unlock the device without lock screen password pattern. 

14.2 LockScreen Lag Bug in Android
02:58

About Video : 

In this video , we are going to see possible ways of changing IMEI. Changing IMEI is an essential part of hacking and you can hide yourself by using random / custom generated IMEI. In this video , ill show you how to generate random / custom IMEI and change imei of MTK device.

14.3 Random / Custom IMEI - Change IMEI
11:29
About the Instructor
Priyank Gada
3.1 Average rating
110 Reviews
3,769 Students
2 Courses
Ethical Hacker

Knowledge is Important . Not grades. 

Ethical hacking , Cyber forensics , website designing , database management , graphic designing , social media marketing and advertising , SEO expert and lots more . basically a computer geek.

In 2014 i started my youtube channel to educate other people and to help them learn something new free of cost. 

I have also helped local police department ( cops ) in solving some major cases in my area . My core knowledge includes working with mySQL database , website development , android app development , SEO , Ethical hacking and forensics .