Python Ethical Hacking : Build tools for ethical hacking
4.2 (448 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
40,890 students enrolled

Python Ethical Hacking : Build tools for ethical hacking

Learn hacking with Python by building your own tools
Bestseller
4.2 (448 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
40,890 students enrolled
Last updated 6/2020
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 10 hours on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Introduction to basics of computer networks
  • What is hacking
  • How to stay anonymous
  • Learn how to track IP location
  • Create your own undetectable malware
  • Execute system commands on the victim machine using backdoor
  • Download and upload files to victim machine
  • How to create a Trojan
  • How to steal wifi passwords stored on the PC
  • How to intercept, manipulate and craft network packets
  • How to perform man in the middle attack
  • Crack password protected zipped files
  • Build your own undetectable key logger
  • Create a botnet with a command and control center
  • How to protect yourself online
Requirements
  • You should have familiarity with basics of python
  • Basic understanding of computer networking
  • A working computer
Description

Python is one of the most used programming language in the world and its significance can't be ignored. Python has gained immense popularity recently owing to its performance in various fields like machine learning, data science, data analytics and cyber security. This course is designed in python to make ethical hacking easier for students since python is one of the most easy programming languages to learn. The concepts used in this course are fairly simple and anyone with some knowledge of computer science can try this course.

In this course we will learn following topics:

  1. Introduction to basics of computer networks

  2. What is hacking

  3. How to stay anonymous

  4. Learn how to track IP location

  5. Create your own undetectable malware

  6. Execute system commands on the victim machine using backdoor

  7. Download and upload files to victim machine

  8. How to create a Trojan

  9. How to steal wifi passwords stored on the PC

  10. How to intercept, manipulate and craft network packets

  11. How to perform man in the middle attack

  12. Crack password protected zipped files

  13. Build your own undetectable key logger

  14. Create a botnet with a command and control center

  15. How to protect yourself online

Who this course is for:
  • Beginner python developers eager to learn ethical hacking
  • Cyber security enthusiasts intending to dive deeper into hacking
  • Hobbyists wanting to learn hacking
Course content
Expand all 122 lectures 09:48:28
+ Getting Started
12 lectures 27:42

The source code is available in the link

https://drive.google.com/open?id=1cFHB8BZuNLZ1gqhglRzzdd0uxBgJTzlV

Source Code
00:00
Integrated Development Environments [IDEs] to use
01:43
Virtual environment
02:58
Virtual environment linux
05:40
virtual environment windows
01:14
virtual environment windows part 2
01:29
visual studio code configuration
06:49
+ Networking Introduction
4 lectures 37:20
Network Classification
12:33
Local Area Network types
05:22
OSI stack
09:17
Common networking terminologies
10:08
+ Staying anonymous
5 lectures 24:35
How to change MAC address
01:49
Creating MAC changer Class
06:46
Regex pattern
04:54
completing MAC function
04:01
Running the program
07:05
+ Geo Tracking
2 lectures 14:22
How HTTP protocol works
05:56
How to track IP location
08:26
+ Packet manipulation - Introduction to scapy module
3 lectures 20:51
Introduction to networking layers TCP / IP/ ETHER
05:53
Scapy introduction
10:40
Working with scapy
04:18
+ Network scanning
4 lectures 28:17
Network Mapper Introduction - NMAP
10:54
Creating scapy scanner
05:43
Scanning network using scapy
04:42
Sending packets
06:58
+ Creating your own malware
16 lectures 01:20:04
Create a server program
08:02
Create a client program
08:09
Create server class
05:36
Listen and accept connections
02:20
Sending and receiving data
03:03
Create client class
00:55
Creating instances for server and client
05:45
Handling the connection
11:36
Getting user input
04:11
Creating command obj
03:41
Getting user command
03:00
Execute system command
02:14
Executing command windows
04:59
Handling empty command
03:05
Adding delimeter
04:10
Receive command result back
09:18
+ Malware - upload viruses and files to victim
7 lectures 28:08
Introduction how to send file
02:29
Getting files on server
09:03
Send file
03:56
Receiving file handler
03:22
Receiving file on victim
04:28
Running the program
02:42
Encrypting viruses
02:08