Basic and Low-level Python Network Attacks
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
10 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Basic and Low-level Python Network Attacks to your Wishlist.

Add to Wishlist

Basic and Low-level Python Network Attacks

Explore the world of Basic and Low-Level Network Attacks with Python
New
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
10 students enrolled
Created by Packt Publishing
Last updated 9/2017
English
English [Auto-generated]
Current price: $12 Original price: $125 Discount: 90% off
3 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • Code network servers and clients and automate repetitive tasks, including brute-force login attacks
  • Break into services by guessing PINs, and exploit blind vulnerabilities by observing time delays
  • Write custom scanning tools, so you can send unusual patterns of packets to find and exploit hidden services
  • Learn how Web pages are delivered, and how to write your own tools to break into vulnerable websites
  • Trick networks into sending data to the wrong destination, or refusing service to clients
View Curriculum
Requirements
  • This course is intended for security professionals who want to learn the basics of using automated vulnerability scanners and attack tools with Python and create low-level Python network attacks.
Description

A penetration tester who only knows how to use tools written by others is limited to old techniques. Knowledge of a programming language will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.This course will commence by showing you how to get the Target and Attacker virtual machines running and properly networked together. You will learn how to connect to a server, and how to automate login requests. This will let you break into services by guessing PINs, and exploit blind vulnerabilities by observing time delays. You will also get your hands dirty and learn how to write custom scanning tools, so that you can send unusual patterns of packets to find and exploit hidden services. Next, you will learn how Web pages are delivered, and how to write your own tools to break into vulnerable websites. Some "blind" services don't return any useful information to guide attackers, but can still be exploited by measuring the time they take to respond. You will also be walked through an in depth understanding of the exact series of network packets required to connect to servers, you can perform many attacks that block traffic or misdirect it through the attacker's system. Using the Scapy library, you can then quickly make network tools, including clients and servers. This is the best way to learn exactly how networking works. Now that you understand normal networking, you can perform attacks that trick networks into sending data to the wrong destination, or refusing service to clients. Towards the end of the course, you will also learn to use these tools to make defenses that distract and confuse attackers, or that detect suspicious network activity.

About the author

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEFCON, HOPE, B-Sides SF, B-Sides LV, BayThreat, LayerOne, Toorcon, and many other schools and conferences. Credentials: PhD, CISSP, DEF CON Black-Badge Co-Winner

Who is the target audience?
  • The goal of this video course is to show you how you can quickly and easily make simple attack tools with Python, even if you have never programmed before.
Compare to Other Python Network Programming Courses
Curriculum For This Course
27 Lectures
02:22:10
+
Port Scanning
5 Lectures 29:02

This video will give an overview of the entire course

Preview 03:12

The aim of this video is to develop a strong foundation by learning how to equip your system with Python

Installation and Setup
07:23

The aim of this video is to get familiar with Ports and undertake processes like banner-grabbing and error handling.

Port Scanning
10:26

The aim of this video is to implement scanning and find a hidden service.

Challenge: Find a Hidden Service
02:48

The aim of this video is to know the importance of Port knocking

Challenge: Port Knocking
05:13
+
HTTP Methods
4 Lectures 28:26

The aim of this video is to learn about various HTTP Methods.

Preview 07:01

The aim of this video is to implement HTTP POST in Python in order to login into a server.

Logging in with POST
08:45

The aim of this video is to understand the Brute Force attacks and how they can be utilized.

Challenge: Brute-Force a Short PIN
07:51

The aim of this video is to gain a better understanding about Brute Force attacks.

Challenge: Brute-Force PIN of Unknown Length
04:49
+
TCP and UDP
6 Lectures 32:20

The aim of this video is to take a look at setting up Kali Linux Virtual Machine in order to use Scapy.

Preview 07:46

The aim of this video is to understand the process of sending and receiving UDP packets by various means.

Sending UDP Packets
04:49

The aim of this video is to gain an in-depth understanding of the TCP handshake, time out, and completing the handshake by sending SYN using Scapy.

Performing a TCP Handshake
07:02

The aim of this video is to further explore TCP handshake and how to insert it into a script using Scapy’s interpreter. We also take a look at using HTTP GET to fetch web pages as well as displaying received replies. 

Fetching a Web Page
07:07

The aim of this video is to explore sending data and take a look at the winners page.

Challenge 1: Send TCP Data
01:27

The aim of this video is to explain about TTL and how hops work. The challenge is to send data to server with TTL = 1 and view the winners page.

Challenge 2: Firewalk
04:09
+
Network Attacks
6 Lectures 25:09

The aim of this video is to prepare a second Kali Linux Virtual machine. We discuss how ARP requests and replies work. Finally, we perform ARP poisoning to redirect traffic on a Local Area Network.

Preview 06:04

The aim of this video is to understand how Router Advertisement works and creating one in Scapy.

IPv6 Router Advertisements
02:49

The aim of this video is to review TCP handshake and understand how to send SYN flood in Scapy.

SYN Flood
03:20

The aim of this video is to understand how to setup two Kali Linux machines and have an apache server to attack. We further understand how HTTP GET works. Finally, we modify the script to create a Slowloris attack.

Slowloris Attack
04:28

The aim of this video is to discuss the SMBloris attack, which is a Denial of Service attack. We also view the challenge as well as the winner’s page.

Challenge 1: SMBloris
04:56

The Land attack challenge and winners.

Challenge 2: Land Attack
03:32
+
Network Defenses
6 Lectures 27:13

The aim of this video is to understand Port scanning with Zenmap and discuss the Yesman honeypot.

Preview 04:46

The aim of this video is to take a look at the network setup consisting of attacker and target machines. We also understand how to make a ping in Scapy and how to detect promiscuous mode.

Detecting Promiscuous NICs
05:13

The aim of this video is to discuss the normal ARP process. We understand how ARP fields are named in Scapy and design scripts to print messages when it detects suspicious ARPs

ARP Poisoning Detection
06:43

The aim of this video is to gain an understanding Privacy and DNS. We also take a look at DNS monitoring in Scapy.

DNS Monitoring
04:56

The aim of this video is to take a look at IPv4 Router Advertisement attack and its challenge to detect RA.

Challenge 1: RA Detection
01:54

The aim of this video is to understand Land attack and the challenge is to detect Land attack.

Challenge 2: Land Attack Detection
03:41
About the Instructor
Packt Publishing
3.9 Average rating
8,274 Reviews
59,301 Students
689 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.