Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 27 hours on-demand video
  • 11 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Ethical Hacking

Ethical Hacking With Python, JavaScript and Kali Linux

Become Ethical Hacker by building your own payloads with Python and JavaScript. (Real World Attacks Included)
Rating: 4.1 out of 54.1 (150 ratings)
10,691 students
Created by Sachin Kafle
Last updated 3/2019
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Learn to use Kali Linux - a penetration testing operating system
  • Learn linux basics
  • Learn to crack WPA networks
  • Learn to remain anonymous while hacking
  • Learn to hack secure systems using client-side and social engineering attacks
  • Learn to launch various Man in the Middle Framework (MITMF) plugins
  • Learn to use Wireshark
  • Learn to use veil framework to make payloads and get access to victim machine file system
  • Learn about information gathering tools like nmap and netdiscover
  • Discover open ports, installed services and vulnerabilities on computer systems
  • Network basics & how devices interact inside a network
  • Learn about BEEF framework
  • Learn to make custom malware and backdoors with Python
  • Learn to make port scanner with Python
  • Learn to make macchanger with Python
  • Learn to pen-test web applications with Javascript with BurpSuite
  • Learn about Socket Programming with Python
  • Learn to gain control over computer systems using client side attacks
  • Learn to create complete web crawler with Python: Application that crawls all subdomains and links
  • Learn to customize payloads to bypass most antiviruses
  • Learn to discover vunerabilties like XSS, HTMLI, URI redirection, XEE and Host Header Injection in live and test website
  • Learn to make Keylogger with Python, JavaScript and Kali tools
  • Learn to gather sensitive information about websites
  • Use social engineering to gain full control over target systems
  • Learn to create some networking applications with Python like nmap scanner and macchanger

Requirements

  • Computer with a minimum 4GB RAM (8GB+ Preferred)
  • No Programming, Hacking Knowledge Required
  • Adding wireless adapter for hacking skill is optional (BUT if you want to learn WIFI hacking skills, you must have one)
  • No networking Knowledge is Required
  • Practice everything along videos, otherwise it is useless

Description

Welcome to this most comprehensive course on Ethical Hacking. Hacking is not always a rewarding activity but it is one of the most fun profession where you can use your knowledge to make yours and others system secured. This course will try to turn you into a person who can check for the vulnerability in the system and make your own payload to pen-test that system and evaluate proper security measures that needs to be adopted. We'll try to make payloads and test systems from section one, Thus this course is highly practical. We (Bit4Stack Tech Inc.) assumes that you have no prior knowledge in these topics, So we will provide some theory related to networking at the beginning and hands on examples with it.

We will cover three modules in this course. Every module will have rich contents related to Hacking. First module covers about Kali Linux and its Hacking Applications. We will go through most of the applications that are available in Kali Linux like airodump-ng, mitmf, wireshark, veil framework, beef framework and lots more. Second module covers Python programming and pen testing machines with it. First of all we will learn about basics of python and we will make applications like mac changer, port scanner and crawler with python. We will have dedicated section to write malware and backdoor with python. Third module covers about JavaScript and its use in web pen-testing. We will make our own payload to find vulnerability in test and live websites. Attacks like XSS, URL redirection, HTML Injection and Host Header Injection.

Highlights of Course:

  1. Kali Linux:

    • Linux Commands

      1. Basic File System commands

      2. Upgrade packaging commands

      3. permission commands

    • Installing Victim and Hacker Machine in Virtual Box

      1. Installing test windows 10 on Virtual Box

    • Information Gathering

      1. Using netdiscover and nmap to uncover IP addresses and mac addresses

    • WPA/WPS attacks

      1. Using airodump-ng to sniff packets

      2. Using Handshake protocols

      3. Using aireplay-ng to deauth clients

    • Man In the Middle Framework

      1. ARP Spoofing

      2. Plugins to take screenshot and inject js-url and jskeylogger

    • WireShark

      1. Analyzing packets flow

    • Veil Framework

      1. Creating undetectable backdoor

      2. Create reverse shell

    • Beef Framework

      1. Browser Exploitation

      2. Running multiple Hook commands

  2. Python:

    • Python Crash Course

      1. Variable and Statements

      2. Values and types

      3. Flow controls

      4. Functions

      5. Object Oriented Programming

      6. Regular Expression

      7. Threading and many more..

    • Port Scanner and Nmap

      1. Scan for IP, mac addresses and Open Port of machine

      2. UDP, TCP and Comprehensive scan

    • Mac changer

      1. Using subprocess

    • Writing a Keylogger

      1. pynput keylogger

      2. pyperclip keylogger

    • Writing a Malware and Backdoor

      1. Undetectable backdoor and malware

      2. Captures screenshot, Locks PC, Opens Web browser, Hijacks Saved Passwords

      3. Hack cmd of window client

    • Writing a web Crawler

      1. Write crawler to find subdomains and links

      2. Using BeautifulSoup

  3. JavaScript:

    • Introduction to BurpSuite

      1. Burpsuite: Repeater, Audit and Crawl, Intruder

    • Cross Site Scripting Attacks

      1. Make custom payloads

      2. Hijack Events

      3. run multiple payloads to test for XSS in live websites

    • URL Redirection

      1. URL Path Fragment

      2. URL path redirection

    • HTML injection

    • Host Header Injection

    • XML External Entity attack

  4. Anonymous:

    • TOR network

      1. Host .onion website

    • VPN

    • Proxy Chains

    • Mac Changer

    • and many more!

Misc topics:

  • Basics of network hacking / penetration testing.

  • Changing MAC address & bypassing filtering.

  • Network mapping.

  • ARP Spoofing - redirect the flow of packets in a network.

  • Spying on any client connected to the network - see usernames, passwords, visited urls ....etc.

  • Inject code in pages loaded by any computer connected to the same network.

  • Replace files on the fly as they get downloaded by any computer on the same network.


Python/JavaScript:

  • Create malware for Windows, OS X and Linux.

  • Hack Windows, OS X and Linux using custom backdoor.

  • Bypass Anti-Virus programs.

  • Use fake login prompt to steal credentials.

  • Display fake updates.

  • Use own keylogger to spy on everything typed on a Windows or OS X computer.

  • Learn the basics of website hacking / penetration testing.

  • Discover subdomains.

  • Discover hidden files and directories in a website.

  • Discover and exploit XSS vulnerabilities, XXE and HTMLI.



DISCLAIMER:

All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, we highly condemn it. We cannot be held responsible for any misuse of the given information.

Who this course is for:

  • For aspirants who want to learn Ethical Hacking using Kali Linux tools
  • For those who wants to learn Python for pentesting the systems
  • For those who wants to learn JavaScript to pen-test web applications
  • For future Security Officers who want to learn scripting language to make career out of it
  • For those who wants to learn to secure their systems from cyber security attacks

Course content

17 sections • 135 lectures • 26h 54m total length

  • Preview03:32
  • Preview06:47
  • Preview01:46

  • Installing Hacker & Victim Machine in Virtual Box
    20:07
  • Linux Commands
    25:01
  • apt-get command
    11:12
  • chmod command
    11:56
  • Networking Basics: Before Hacking
    07:07
  • Information Gathering
    16:36
  • Airmon-ng: Change Default mode of adapter to monitor mode
    09:31
  • Change Managed Mode to Monitor Mode: Manual Method
    08:00
  • Crack WPA: airodump-ng and crunch
    21:09
  • Crack WPA with Wordlist
    07:07
  • Man In The Middle Framework: ARP Spoof
    05:47
  • ARP Spoofing and Capturing Packets with MITMF
    09:40
  • MITMF Plugins
    13:50
  • Inject Keylogger and take Screenshots with MITMF
    06:31
  • Wireshark and MITMF Together to Hijack HTTP requests
    13:30
  • Installing and configuring Veil Framework
    07:30
  • Custom Payload with Veil
    11:50
  • Making Backdoor: Reverse_HTTPS with Veil
    10:45
  • Configuring Listener with msfconsole
    16:12
  • Veil in action to get Connection from Client
    12:24
  • Introduction to Beef Framework
    12:04
  • Beef & MITMF in action to exploit Client Browser
    09:59
  • Ethical Hacking Quiz
    15 questions

  • Start Python Crash Course: Command, Statement & Scripts
    03:19
  • Keywords and types
    06:53
  • Variables in Python
    13:24
  • Formatting your text
    10:16
  • Operators, Operands and Logic
    14:29
  • Flow Controls: Conditionals
    08:55
  • Flow Controls: Looping
    17:32
  • User Defined and Lambda Functions
    14:09
  • Scope and Packing, Unpacking Arguments
    08:34
  • File Handling with Python
    07:21
  • Data Structure: Lists
    15:55
  • Strings and inbuilt_methods
    14:44
  • Data Structure: Dictionary
    09:41
  • Data Structure: Tuples
    11:17
  • Object Oriented Programming
    18:08
  • Python Inheritance
    09:09
  • List Comprehension
    04:43

  • Regular Expression
    15:37
  • Intro to Mac Address Changer
    10:03
  • Scripts for running commands in the Shell
    12:20
  • Change MAC address
    12:56
  • Random MAC Changer
    15:39

  • TOR for Anonymous Browsing
    25:04
  • Host Your Own Website with TOR
    14:28
  • Remain Anonymous with Virtual Private Networks (VPN)
    09:25
  • Prevent DNS Leaks with Proxychains
    20:56

  • Introduction to NMAP Scanner & nmap module
    20:36
  • TCP, UDP and Comprehensive scan with nmap
    09:38
  • Making PortScanner: Clone of NetDiscover tools of Kali
    12:46
  • Using Scapy Module to implement ARP protocols
    11:35
  • Formatting Responses to get IP and MAC addresses of Clients
    17:59

  • Keylogger with Pynput Module
    19:06
  • Keylogger using pyperclip module
    08:22

  • Scripts for running commands on Clients
    06:03
  • WIFI Password of Client with Delivery Method to Gmail
    15:51
  • Downloading files Script
    10:30
  • Beelogger: Modify your Keylogger
    26:54
  • Making Advance Keylogger
    17:54
  • Deliver Keylogger and Observe Keylogs
    08:58
  • Implementation of Download file feature in Client
    22:26
  • LaZagne: Capture Password with Our Malware
    14:59
  • Packaging of Python File in Linux
    16:47
  • Packaging technique to bypass Antiviruses
    11:53
  • Convert Backdoor to Trojans
    07:43

  • Threading with Python
    15:15
  • Backdoor and Socket Programming
    12:37
  • Send and Recieve Data Between Server & Client
    10:48
  • Start Advance Payloads making Listener: Kali Linux
    24:25
  • Run Multiple Threads with threading module
    12:30
  • List all connections
    23:17
  • Client: Sandboxie, Mutex and VMs
    20:03
  • Connect to Server and List Connections
    20:21
  • Interact with connection
    18:22
  • Send Message to Client From Backdoor
    14:14
  • Open Web Browser of Windows Machine from Backdoor
    06:46
  • Take Screenshots from Backdoor
    33:59
  • Lock Client using Backdoor
    05:47
  • Hijack Command Shell of Client: Server Side
    24:26
  • Hijack Command Shell of Client: Client Side
    16:53
  • Test Backdoor with Antiviruses
    07:25

  • Getting response with requests module
    08:26
  • Crawl all subdomains of main site
    12:08
  • Discover Hidden URL of websites and Formatting
    19:33
  • BeautifulSoup: Easy method to make Crawler
    08:18

Instructor

Sachin Kafle
Founder of CSAMIN & Bit4Stack Tech Inc. [[Author, Teacher]]
Sachin Kafle
  • 4.0 Instructor Rating
  • 1,749 Reviews
  • 85,972 Students
  • 13 Courses

Sachin Kafle is a Python and Java developer, ethical hacker and social activist. His interest's lies in software development and integration practices in the areas of computation, quantitative fields of trade. His technological interests include Python, C, Java, C# programming. He has been involved in teaching since 2013.

Sachin is a engineer of Computer Science (B.E. Computer Science). He is also an instructor on his previously made some geek Youtube channel. He has been giving free classes mostly for students who have not been able to pay for expensive classes in his country.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.