Course curriculum

    1. Introduction to Python for ethical hacking

    2. VirtualBox installation

    3. Kali Linux installation

    4. Guest Additions installation

    5. Python in Kali terminal

    1. Building a simple portscanner

    2. Adding raw_input to our port scanner

    3. Scanning the first 1000 ports

    4. Coding an advanced port scanner part 1

    5. Coding an advanced port scanner part 2

    6. Finishing and testing our scanner

    7. Configuring IP address and installing Metasploitable

    8. Returning banner from open port

    9. Coding a vulnerability scanner part 1

    10. Coding a vulnerability scanner part 2

    1. Automating SSH login part 1

    2. Automating SSH login part 2

    3. Testing our SSH login program

    4. Coding SSH brute-forcer

    5. Executing commands on target after brute-forcing SSH

    6. Anonymous FTP login attack

    7. Username and password list attack on FTP

    1. SHA256, SHA512, MD5

    2. Cracking SHA1 hash with online dictionary

    3. Getting password from MD5 hash

    4. Cracking crypt passwords with Salt

    1. Changing MAC address manually

    2. Coding MAC address changer

    3. Theory behind ARP spoofing

    4. Crafting malicious ARP packet

    5. Coding ARP spoofer

    6. Forwarding packets and restoring ARP tables

    7. Spoofing our IP address and sending message with TCP payload

    8. Running SynFlooder with changed source IP address

    9. Getting source and destination MAC address from received packets

    10. Sniffing FTP username and password part 1

    11. Sniffing FTP username and password part 2

    12. Getting passwords from HTTP websites

    1. Cloning any webpage

    2. Printing DNS queries

    3. Redirecting response to cloned page

    4. Setting IP table rules and running DNS spoofer

About this course

  • $9.99
  • 89 lessons
  • 17.5 hours of video content

Discover your potential, starting today