The Complete Python Hacking Course: Beginner to Advanced!
Created by Joseph Delgadillo, Last Updated 13-Jun-2020, Language:English
The Complete Python Hacking Course: Beginner to Advanced!
Learn ethical hacking, penetration testing and network security while working on Python coding projects!
Created by Joseph Delgadillo, Last Updated 13-Jun-2020, Language:English
What Will I Get ?
- Ethical hacking fundamentals
- Python programming fundamentals
- Penetration testing
- Network security
- Port and vulnerability scanning
- SSH and FTP attacks
- Password cracking
- Sniffers, flooders and spoofers
- DNS spoofing
- Network analysis
- Multi-functioning reverse shell
Requirements
- Access to a personal computer or equivalent system
- Internet connection to download Python and additional packages
Description
If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course:
Introduction and setup
Port and vulnerability scanning
SSH and FTP attacks
Password cracking
Sniffers, flooders and spoofers
DNS spoofing
Network analysis
Coding a multi-functioning reverse shell
Keyloggers
Command and control center
Website penetration testing
This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.
Still not sold? Check out these great reviews!
"It's already fun wow. I enjoy learning ethical hacking and python"
"Great even for non-programmers!"
"Great Course"
Thank you for taking the time to read this and we hope to see you in the course!
Course Content
-
Introduction and Setup
5 Lectures 01:02:36-
Welcome to Python for ethical hacking!
Preview00:05:16 -
VirtualBox installation
00:11:38 -
Kali Linux installation
00:17:05 -
Adding Guest Additions
00:15:06 -
Python in Kali terminal
00:13:31
-
-
Port and Vulnerability Scanning
10 Lectures 01:42:44-
Coding a simple port scanner
Preview00:15:30 -
Adding raw_input to our port scanner
Preview00:09:21 -
Scanning the first 1,000 ports
00:04:46 -
Coding an advanced port scanner part 1
00:13:12 -
Coding an advanced port scanner part 2
00:08:48 -
Finishing and testing our scanner
00:08:55 -
Configuring IP address and installing Metasploitable
00:08:13 -
Returning banner from open port
00:14:45 -
Coding a vulnerability scanner part 1
00:11:55 -
Coding a vulnerability scanner part 2
00:07:19
-
-
SSH and FTP Attacks
7 Lectures 01:15:59-
Automating SSH login part 1
Preview00:09:54 -
Automating SSH login part 2
00:09:20 -
Testing our SSH login program
00:08:34 -
Coding a SSH brute-forcer
00:10:37 -
Executing commands on target after brute-forcing SSH
00:10:09 -
Anonymous FTP login attack
00:09:53 -
Username & password list attack on FTP
00:17:32
-
-
Password Cracking
4 Lectures 01:02:40-
SHA256, SHA512, MD5
Preview00:08:36 -
Cracking SHA1 hash with online dictionary
00:16:40 -
Getting password from MD5 hash
00:13:22 -
Cracking crypt passwords with salt
00:24:02
-
-
Sniffers, Flooders and Spoofers
12 Lectures 02:33:36-
Changing MAC address manually
Preview00:08:33 -
Coding MAC address changer
00:16:56 -
Theory behind ARP spoofing
00:04:42 -
Crafting malicious ARP packet
00:19:26 -
Coding ARP spoofer
00:13:31 -
Forwarding packets and restoring ARP tables
00:08:04 -
Spoofing our IP address and sending message with TCP payload
00:12:00 -
Running SynFlooder with changed source IP address
00:11:20 -
Getting source and destination MAC address from received packets
00:24:45 -
Sniffing FTP username and password part 1
00:08:09 -
Sniffing FTP username and password part 2
00:12:09 -
Getting passwords from HTTP websites
00:14:01
-
-
Coding DNS Spoofer
4 Lectures 00:47:52-
Cloning any webpage
00:10:36 -
Printing DNS queries
00:09:57 -
Redirecting response to cloned page
00:16:44 -
Setting IP table rules and running DNS spoofer
00:10:35
-
-
Network Analysis
5 Lectures 01:20:38-
Analyzing Ethernet header
00:16:07 -
Analyzing IP header part 1
00:10:24 -
Analyzing IP header part 2
00:25:34 -
Analyzing TCP header
00:15:13 -
Analyzing UDP header
00:13:20
-
-
Multi-functioning Reverse Shell
17 Lectures 03:14:14-
Theory behind socket programming
00:07:20 -
Wine and Pyinstaller installation
00:07:41 -
Setting up listener
00:08:17 -
Establishing connection between target and server
00:06:31 -
Implementing send & receive functions
00:11:28 -
Executing commands on target system
00:11:43 -
Importing JSON library to parse data
00:08:19 -
Converting Python backdoor to .exe
00:08:14 -
Using OS library to change directory
00:09:58 -
Downloading & uploading files to target PC
00:19:07 -
Hiding our backdoor and creating persistence
00:13:49 -
Trying to connect to server every 20 seconds
00:07:52 -
Downloading files to target PC
00:11:49 -
Capturing screenshot on target PC
00:23:04 -
Administrator privilege check
00:08:14 -
Starting other programs with our shell
00:10:43 -
Running our shell as an image, audio, PDF
00:20:05
-
-
Coding a Keylogger
4 Lectures 00:38:01-
Installing Pynput
00:06:19 -
Printing space character
00:08:48 -
Calling timer on our keylogger
00:09:56 -
Adding keylogger to our backdoor
00:12:58
-
-
Command and Control Center
7 Lectures 01:17:26-
What is a threaded server?
00:05:05 -
Accepting connections with a thread
00:13:11 -
Managing multiple sessions
00:08:39 -
Testing threaded server with Windows 10 target
00:09:04 -
Fixing Q command
00:11:11 -
Coding exit function
00:13:50 -
Attacking multiple targets and gathering botnet
00:16:26
-
-
Website Penetration Testing
14 Lectures 02:25:23-
Stealing saved wireless passwords
00:21:55 -
Saving passwords to a file
00:03:02 -
Bruteforcing Gmail
00:10:13 -
Bruteforcing any login page part 1
00:12:59 -
Bruteforcing any login page part 2
00:10:07 -
Finding hidden directories part 1
00:05:10 -
Finding hidden directories part 2
00:06:36 -
Discovering subdomains
00:11:31 -
Changing HTTP headers
00:13:55 -
Starting basic and digest authentication bruteforcer
00:10:23 -
Controlling threads
00:08:34 -
Coding run function
00:10:06 -
Printing usage and testing our program
00:12:33 -
Taking a look at ransomware
00:08:19
-

Joseph Delgadillo
Best-Selling Instructor
Joseph Delgadillo is the founder of JTDigital Courses, an education technology company. He has been active in the online learning community since 2015 and has worked with multiple startups. As of 2020, over 800,000 students across the globe have enrolled in his courses covering ethical hacking, Python programming, web development and more.
He graduated with honors from Central Washington University.