-
KoosaAko
Encryption
love you bro,but please how to encrypted file and folders on windows
-
Andrew Macmillan
This is the probably the best method of learning a language I've encountered to date. So many courses have you building random and non-transferable apps, this will not only solidify your understanding of how computer networks work but also teach the language in a way that is rewarding and exciting
Curriculum
-
Introduction
-
Writing a MAC Address Changer - Python Basics
- What is MAC Address & How To Change it
- Using Python Modules & Executing System Commands
- Implementing a Very Basic MAC Changer
- Variables & Strings
- Using Variables in MAC Changer
- Getting Input From The User
- Handling User Input
- Handling Command-line Arguments
- Initialising Variables Based on Command-line Arguments
- Python Functions
- Returning Values From Functions
- Decision Making in Python
- Using Conditional Statements in MAC Changer
-
MAC Changer - Algorithm Design
-
Programming a Network Scanner
- Introduction & Teaser
- Installing Windows as a Virtual Machine
- Introduction to ARP
- Designing an Algorithm To Discover Clients Connected To The Same Network
- Using Scapy To Create an ARP Request
- Combining Frames To Broadcast Packets
- Sending & Receiving Packets
- Introduction Lists in Python
- Iterating Over Lists & Analysing Packet
- Using Escape Characters To Enhance Program Output
- Introduction to Dictionaries in Python
- Improving the Program Using a List of Dictionaries
- Iterating Over Nested Data Structures
- Assignment 1: Get IP Range Using Command Line Arguments
- Assignment 1 (solution): Get IP Range Using Command Line Arguments – solution
- Testing The Network Scanner With Python 3
-
Writing an ARP Spoofer
- What is ARP Spoofing?
- Intercepting Data in a Network Using arpspoof
- Creating an ARP Response
- Sending ARP Responses
- Extracting MAC Address From Responses
- Introduction to Loops in Python
- More on Loops & Counters
- Dynamic Printing
- Exception Handling in Python
- Implementing a Restore Function
- Restoring ARP Tables When an Exception Occures
- Assignment 2: Fix Dynamic Printing
- Assignment 2 (solution): Fix Dynamic Printing
-
Writing a Packet Sniffer
-
Writing a DNS Spoofer
- Intercepting Packets – Creating a Proxy
- Converting Packets to Scapy Packets
- Introduction to DNS Spoofing
- Filtering DNS Responses
- Analysing & Creating a Custom DNS Response
- Modifying Packets On The Fly
- Redirecting DNS Responses
- Assignment 3: Conversion Between Strings & Bytes
- Assignment 3 (solution): Conversion Between Strings & Bytes
-
Writing a File Interceptor
- Introduction & Teaser
- Filtering Traffic Based on the Port Used
- Analysing HTTP Requests
- Intercepting HTTP Requests
- Modifying HTTP Responses on The Fly
- Intercepting & Replacing Downloads on The Network
- Assignment 4: Testing The File Interceptor With Python 3
- Assignment 4 (solution): Testing The File Interceptor With Python 3
-
Writing a Code Injector
- Introduction & Teaser
- Analysing HTTP Responses
- Replacing a Substring Using Regex
- Decoding HTTP Responses
- Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
- Refactoring & Housekeeping
- Debugging Issues in Python
- Using Groups & None-capturing Regex
- Recalculating Content Length
- Assignment 5: Test The Code Injector With Python 3
- Assignment 5 (solution): Test The Code Injector With Python 3
- BeEF Overview & Basic Hook Method
- Hooking Computers Using code_injector
- Basic BeEF Commands
- Delivering Malware Using BeEF
-
Bypassing HTTPS
-
Writing an ARP Spoof Detector
-
Writing Malware
- Introduction & Teaser
- Execute System Command Payload
- Sending Emails Using Python
- Filtering Command Output Using Regex
- Stealing WiFi Passwords Saved on a Computer
- Downloading Files From Program
- Writing Files on Disk
- Password Recovery Basics
- Stealing Saved Passwords From Remote Computers
- Interacting With The File System
-
Writing Malware - Keylogger
-
Writing Malware - Backdoors
- Introduction & Teaser
- Client – Server Communication & Connection Types
- Connecting Two Remote Computers Using Sockets
- Sending & Receiving Data Over TCP
- Executing System Commands Remotely
- Implementing a Server
- Implementing Skeleton For Server – Client Communication
- Refactoring – Creating a Listener Class
- Refactoring – Creating a Backdoor Class
- Serialisation – Theory
- Serialisation – Implementing Reliable Methods to Send & Receive Data Over TCP
- Serialisation – Reliably Sending & Receiving Data
- Sending Commands as List & Implementing Exit Command
- Interacting With the File System – Implementing “cd” Command
- Reading Files Using Python
- Writing Files Using Python
- Downloading Files From Hacked Computer
- Implementing Upload Functionality in Listener
- Implementing Upload Functionality in Backdoor
- Handling Unknown Exceptions
- Using the Backdoor to Hack Windows, Linux & OS X
-
Writing Malware - Packaging
- Introduction & Teaser
- Converting Python Programs To Windows Binary Executables
- Running Executables Silentely
- Installing Windows Pyinstaller on Linux
- Packaging Programs For Windows From Linux
- Introduction to Persistence
- Running Programs on Startup
- Creating a Basic Trojan Using Download & Execute Payload
- Creating a Trojan By Embedding Files In Program Code
- Bypassing Anti-Virus Programs – Theory
- Bypassing Anti-Virus Programs – Practical
- Adding an Icon to Generated Executables
- Spoofing File Extension
- Converting Python Programs To OS X Executables
- Converting Python Programs to Linux Executables
-
Website / Web Application Hacking
-
Website Hacking - Writing a Crawler
- Sending GET Requests To Web Servers
- Discovering Website Subdomains Using Python
- Discovering Hidden Paths in Websites
- Reading Response Content
- Extracting Useful Data From Response
- Filtering Rsults
- Extracting Unique Links & Storing Them In a List
- Recursively Discovering All Paths On a Target Website
- Testing The Crawler With Python 3
-
Writing a Program To Guess Login Information
-
Writing a Vulnerability Scanner
- Introduction & Teaser
- HTTP Requests – POST VS GET
- Parsing HTML Code Using Python
- Extracting HTML Attributes
- Posting Forms
- Building Basic Structure For Vulnerability Scanner
- Using Default Parameters
- Sending Requests in a Session
- Extracting & Submitting Forms Automatically
- Implementing a Method To Run The Scanner
- Discovering XSS Vulnerabilities
- Exploiting XSS Vulnerabilities
- Implementing Code To Discover XSS in Forms
- Implementing Code To Discover XSS in Parameters
- Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
- Assignment 7: Test The Vulnerability Scanner With Python 3
- Assignment 7 (solution): Test The Vulnerability Scanner With Python 3
-
Bonus Section