The Complete Python Hacking Course: Beginner to Advanced!
4.5 (782 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
103,753 students enrolled

The Complete Python Hacking Course: Beginner to Advanced!

Learn ethical hacking, penetration testing and network security while working on Python coding projects!
Highest Rated
4.5 (782 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
103,753 students enrolled
Created by Joseph Delgadillo
Last updated 11/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 17.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Ethical Hacking
  • Python Programming
  • Penetration Testing
  • Network Security
  • Port and Vulnerability Scanning
  • SSH and FTP Attacks
  • Password Cracking
  • Sniffers, Flooders and Spoofers
  • DNS Spoofing
  • Network Analysis
  • Multi-functioning Reverse Shell
Requirements
  • A basic understanding of ethical hacking related concepts.
  • An eager and open mind!
Description

If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course:

  • Introduction and setup

  • Port and vulnerability scanning

  • SSH and FTP attacks

  • Password cracking

  • Sniffers, flooders and spoofers

  • DNS spoofing

  • Network analysis

  • Coding a multi-functioning reverse shell

  • Keyloggers

  • Command and control center

  • Website penetration testing

This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.

Still not sold? Check out these great reviews!

"It's already fun wow. I enjoy learning ethical hacking and python"

"Great even for non-programmers!"

"Great Course"

Thank you for taking the time to read this and we hope to see you in the course!

Who this course is for:
  • Python developers interested in ethical hacking and network security.
  • Students interested in learning Python, a powerful scripting language.
Course content
Expand all 89 lectures 17:21:16
+ Port and Vulnerability Scanning
10 lectures 01:42:44
Coding a simple port scanner
15:30
Adding raw_input to our port scanner
09:21
Scanning the first 1,000 ports
04:46
Coding an advanced port scanner part 1
13:12
Coding an advanced port scanner part 2
08:48
Finishing and testing our scanner
08:55
Configuring IP address and installing Metasploitable
08:13
Returning banner from open port
14:45
Coding a vulnerability scanner part 1
11:55
Coding a vulnerability scanner part 2
07:19
+ SSH and FTP Attacks
7 lectures 01:15:59
Automating SSH login part 1
09:54
Automating SSH login part 2
09:20
Testing our SSH login program
08:34
Coding a SSH brute-forcer
10:37
Executing commands on target after brute-forcing SSH
10:09
Anonymous FTP login attack
09:53
Username & password list attack on FTP
17:32
+ Password Cracking
4 lectures 01:02:40
SHA256, SHA512, MD5
08:36
Cracking SHA1 hash with online dictionary
16:40
Getting password from MD5 hash
13:22
Cracking crypt passwords with salt
24:02
+ Sniffers, Flooders and Spoofers
12 lectures 02:33:38
Changing MAC address manually
08:34
Coding MAC address changer
16:56
Theory behind ARP spoofing
04:42
Crafting malicious ARP packet
19:26
Coding ARP spoofer
13:31
Forwarding packets and restoring ARP tables
08:04
Spoofing our IP address and sending message with TCP payload
12:01
Running SynFlooder with changed source IP address
11:20
Getting source and destination MAC address from received packets
24:45
Sniffing FTP username and password part 1
08:09
Sniffing FTP username and password part 2
12:09
Getting passwords from HTTP websites
14:01
+ Coding DNS Spoofer
4 lectures 47:52
Cloning any webpage
10:36
Printing DNS queries
09:57
Redirecting response to cloned page
16:44
Setting IP table rules and running DNS spoofer
10:35
+ Network Analysis
5 lectures 01:20:38
Analyzing Ethernet header
16:07
Analyzing IP header part 1
10:24
Analyzing IP header part 2
25:34
Analyzing TCP header
15:13
Analyzing UDP header
13:20
+ Multi-functioning Reverse Shell
17 lectures 03:14:15
Theory behind socket programming
07:20
Wine and Pyinstaller installation
07:41
Setting up listener
08:17
Establishing connection between target and server
06:31
Implementing send & receive functions
11:28
Executing commands on target system
11:43
Importing JSON library to parse data
08:19
Converting Python backdoor to .exe
08:14
Using OS library to change directory
09:58
Downloading & uploading files to target PC
19:07
Hiding our backdoor and creating persistence
13:49
Trying to connect to server every 20 seconds
07:52
Downloading files to target PC
11:49
Capturing screenshot on target PC
23:04
Administrator privilege check
08:14
Starting other programs with our shell
10:44
Running our shell as an image, audio, PDF
20:05
+ Coding a Keylogger
4 lectures 38:01
Installing Pynput
06:19
Printing space character
08:48
Calling timer on our keylogger
09:56
Adding keylogger to our backdoor
12:58
+ Command and Control Center
7 lectures 01:17:27
What is a threaded server?
05:05
Accepting connections with a thread
13:11
Managing multiple sessions
08:39
Testing threaded server with Windows 10 target
09:04
Fixing Q command
11:11
Coding exit function
13:51
Attacking multiple targets and gathering botnet
16:26