Introduction and Setup
- Welcome to Python for Ethical Hacking!
- VirtualBox installation
- Kali Linux Installation
- Adding Guest Additions
Port and Vulnerability Scanning
You will learn how to code a simple port scanner, how to add raw_input to our port scanner, how to scan the first 1,000 ports, how to code an advanced port scanner part 1, how to code an advanced port scanner part 2, and more. This module will also teach you the following:
- Finishing and Testing our Scanner
- Configuring IP Address and Installing Metasploitable
- Returning Banner from Open Port
- Coding a Vulnerability Scanner Part 1
- Coding a Vulnerability Scanner Part 2
SSH and FTP Attacks
- Automating SSH Login Part 1
- Automating SSH Login Part 2
- Testing Our SSH Login Program
- Coding a SSH Brute-Forcer
- Executing Commands on Target After Brute-Forcing SSH
- Anonymous FTP Login Attack
- Username & Password List Attack on FTP
Password Cracking
- SHA256, SHA512, MD5
- Cracking SHA1 Hash with Online Dictionary
- Getting Password from MD5 Hash
- Cracking crypt passwords with salt
Sniffers, Flooders and Spoofers
You will learn how to change MAC addresses manually, how to code MAC address changes, the theory behind ARP spoofing, how to craft malicious ARP packets, and how to code ARP spoofers. Therefore, you will also gain insights into how to forward packets and restore ARP tables, how to spoof our IP address and send messages with TCP payload, how to run SynFlooder with a changed source IP address, and more. This module will also teach you the following:
- Getting Source and Destination MAC Address from Received Packets
- Sniffing FTP Username and Password Part 1
- Sniffing FTP Username and Password Part 2
- Getting Passwords from HTTP Websites
- Cloning Any Webpage
- Printing DNS Queries
Coding DNS Spoofer
- Redirecting Response to Cloned Page
- Setting IP Table Rules and Running DNS Spoofer
Network Analysis
- Analyzing Ethernet Header
- Analyzing IP Header Part 1
- Analyzing IP Header Part 2
- Analyzing TCP Header
Multi-Functioning Reverse
You will learn the theory behind socket programming, wine and Pyinstaller installation, how to set up a listener, how to establish a connection between the target and server, how to implement send and receive functions, and how to execute commands on the target system. Moreover, you will gain comprehension in importing JSON library to Parse data, converting Python backdoor to .exe, using OS library to change directory, downloading & uploading files to target PC, and more. This module will teach you the following:
- Hiding Our Backdoor and Creating Persistence
- Trying to Connect to Server Every 20 Seconds
- Downloading Files to Target PC
- Capturing Screenshots on Target PC
- Administrator Privilege Check
- Starting Other Programs with Our Shell
- Running Our Shell As an Image, Audio, PDF
Coding a Keylogger
- Installing Pynput
- Printing Space Character
- Calling Timer on Our Keylogger
- Adding Keylogger to Our Backdoor
Command and Control Center
- What is a Threaded Server?
- Accepting Connections with a Thread
- Managing Multiple Sessions
- Testing Threaded Server with Windows 10 target
- Fixing Q Command
- Coding Exit Function
- Attacking Multiple Targets and Gathering Botnet
Website Penetration Testing
You will comprehend how to steal saved wireless passwords, how to save passwords to a file, how to bruteforce Gmail, how to bruteforce any login page part 1, how to bruteforce any login page part 2, how to find hidden directories Part 1, and how to find hidden directories part 2. Here, you will also learn discover subdomains, how to change HTTP Headers, how to start basic and digest authentication bruteforcer, and more. This module will further teach you:
- Controlling Threads
- Coding Run Function
- Printing Usage and Testing Our Program
- Taking a Look at Ransomware