Learn Python & Ethical Hacking From Scratch

Avatar
(0 review)
$195.00 $69.00

Welcome this great course where you’ll learn python programming and ethical hacking at the same time, the course assumes you have NO prior knowledge in any of these topics, and by the end of it you’ll be at a high intermediate level being able to combine both of these skills and write python programs to hack into computer systems exactly the same way that black hat hackers do, not only that but you’ll be able to use the programming skills you learn here to write any program even if it has nothing to do with hacking.

This course is highly practical but it won’t neglect the theory, so we’ll start with covering some basics about ethical hacking and python programming, installing the needed software and then we’ll dive and start programming straight away. From here onwards you’ll learn everything by example, by writing useful hacking programs, so we’ll never have any boring dry programming lectures.

The course is divided into a number of sections each aims to achieve a specific goal, the goal is usually to hack into a certain system, so we’ll start by learning how this system work, the weaknesses of this system, and then you’ll lean how to write a python program to exploit these weaknesses and hack the system, as we write the program I will teach you python programming from scratch covering one topic at a time, so by the end of the course you’re going to have a number of ethical hacking programs written by yourself (see below) from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools and the list goes on, not only that but you’ll also have a deep understanding on how computer systems work, how to model problems, design an algorithm to solve problems and implement the solution using python.

As mentioned in this course you will learn both ethical hacking and programming at the same time, so here are some of the topics that will be covered in the course:

Programming topics:

  • Writing programs for python 2 and 3.
  • Using modules and libraries.
  • Variables, types …etc.
  • Handling user input.
  • Reading and writing files.
  • Functions.
  • Loops.
  • Data structures.
  • Regex.
  • Desiccation making.
  • Recursion.
  • Threading.
  • Object oriented programming.
  • Packet manipulation using scapy.
  • Netfilterqueue.
  • Socket programming.
  • String manipulation.
  • Exceptions.
  • Serialisation.
  • Compiling programs to binary executables.
  • Sending & receiving HTTP requests.
  • Parsing HTML.
  • + more!

Hacking topics:

  • Basics of network hacking / penetration testing.
  • Changing MAC address & bypassing filtering.
  • Network mapping.
  • ARP Spoofing – redirect the flow of packets in a network.
  • DNS Spoofing – Redirect requests from one website to another.
  • Spying on any client connected to the network – see usernames, passwords, visited urls ….etc.
  • Inject code in pages loaded by any computer connected to the same network.
  • Replace files on the fly as they get downloaded by any computer on the same network.
  • Detect ARP spoofing attacks.
  • Bypass HTTPS.
  • Create malware for Windows, OS X and Linux.
  • Create trojans for Windows, OS X and Linux.
  • Hack Windows, OS X and Linux using custom backdoor.
  • Bypass Anti-Virus programs.
  • Use fake login prompt to steal credentials.
  • Display fake updates.
  • Use own keylogger to spy on everything typed on a Windows or OS X computer.
  • Learn the basics of website hacking / penetration testing.
  • Discover subdomains.
  • Discover hidden files and directories in a website.
  • Run wordlist attacks to guess login information.
  • Discover and exploit XSS vulnerabilities.
  • Discover weaknesses in websites using own vulnerability scanner.

Programs you’ll build in this course:

You’ll learn all the above by implementing the following hacking programs

  • mac_changer – changes MAC Address to anything we want.
  • network_scanner – scans network and discovers the IP and MAC address of all connected clients.
  • arp_spoofer – runs an arp spoofing attack to redirect the flow of packets in the network allowing us to intercept data.
  • packet_sniffer – filters intercepted data and shows usernames, passwords, visited links ….etc
  • dns_spoofer – redirects DNS requests, eg: redirects requests to from one domain to another.
  • file_interceptor – replaces intercepted files with any file we want.
  • code_injector – injects code in intercepted HTML pages.
  • arpspoof_detector – detects ARP spoofing attacks.
  • execute_command payload – executes a system command on the computer it gets executed on.
  • execute_and_report payload – executes a system command and reports result via email.
  • download_and_execute payload – downloads a file and executes it on target system.
  • download_execute_and_report payload – downloads a file, executes it, and reports result by email.
  • reverse_backdoor – gives remote control over the system it gets executed on, allows us to
    • Access file system.
    • Execute system commands.
    • Download & upload files
  • keylogger – records key-strikes and sends them to us by email.
  • crawler – discovers hidden paths on a target website.
  • discover_subdomains – discovers subdomains on target website.
  • spider – maps the whole target website and discovers all files, directories and links.
  • guess_login – runs a wordlist attack to guess login information.
  • vulnerability_scanner – scans a target website for weaknesses and produces a report with all findings.

As you build the above you’ll learn:

  • Setting up a penetration testing lab to practice hacking safely.
  • Installing Kali Linux and Windows as virtual machines inside ANY operating system.
  • Linux Basics.
  • Linux terminal basics.
  • How networks work.
  • How clients communicate in a network.
  • Address Resolution Protocol – ARP.
  • Network layers.
  • Domain Name System – DNS.
  • Hypertext Transfer Protocol – HTTP.
  • HTTPS.
  • How anti-virus programs work.
  • Sockets.
  • Connecting devices over TCP.
  • Transferring data over TCP.
  • How website work.
  • GET & POST requests.
  • And more!

So by the end of the course you’re going to have programming skills to write any program even if it has nothing to do with hacking, but you’ll learn programming by programming hacking tools!

With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.

 

What are the requirements?

  • Basic IT knowledge
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux

What am I going to get from this course?

  • 175 detailed videos about Python programming & ethical hacking
  • Learn 2 topics at the same time – Python programming & Ethical Hacking
  • Start from scratch up to a high-intermediate level
  • Write over 20 ethical hacking and security programs
  • Learn by example, by writing exciting programs
  • Model problems, design solutions & implement them using Python
  • Write programs in Python 2 and 3
  • Write cross platform programs that work on Windows, OS X and Linux
  • Have a deep understanding on how computer systems work
  • Have a strong base and be able to use the skills learned to write any program even if its not related to hacking
  • Understand what is Hacking, what is Programming, and why are they related
  • Design a testing lab to practice hacking & programming safely
  • Interact & use Linux terminal
  • Understand what MAC address is & how to change it
  • Write a python program to change MAC address
  • Use Python modules and libraries
  • Understand what Object Oriented Programming is
  • Write object oriented programs
  • Model & design extendable programs
  • Write a program that can discover all clients connected to the same network
  • Read, analyse & manipulate network packets
  • Understand & interact with different network layers in packets such as ARP, DNS, HTTP ….etc
  • Write a program that can redirect the flow of packets in a network (arp spoofer)
  • Write a packet sniffer to filter interesting data such as usernames and passwords
  • Write a program to redirect DNS requests (DNS Spoofer)
  • Intercept and modify network packets on the fly
  • Write a program to replace downloads requested by any computer on the network
  • Analyse & modify HTTP requests and responses
  • Inject code in HTML pages loaded by any computer on the same network
  • Downgrade HTTPS to HTTP
  • Write a program that can detect ARP Spoofing attacks
  • Write custom made payloads to download a file, execute command, download & execute, download execute & report …..etc
  • Use sockets to send data over TCP
  • Send data reliably over TCP
  • Write client-server programs
  • Write a backdoor that works on Windows, OS X and Linux
  • Implement cool features in the backdoor such as file system access, upload and download files and persistence
  • Write a remote keylogger that can register all keystrikes and send them by Email
  • Interact with files using python (read, write & modify)
  • Convert python programs to binary executables that work on Windows, OS X and Linux
  • Convert evil files into torjans that work and function just like any other file type like an image or a PDF
  • Bypass Anti-Virus Programs
  • Understand how websites work, the technologies used and how to test them for weaknesses
  • Write a program that can discover hidden paths in a website
  • Send requests towebsites and analyse responses
  • Write a program that can map a website and discover all links, subdomains, files and directories
  • Extract and submit forms from python
  • Run dictionary attacks and guess login information on login pages
  • Write a program that can discover weaknesses in websites

What is the target audience?

  • Anybody who is interested in learning Python programming
  • Anybody who is interested in learning ethical hacking / penetration testing

 

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

NOTE: This course is totally a product of Zaid Sabih & zSecurity and No other organization is associated for certification exam for the same.

 

Course Features

  • Lectures 175
  • Duration 24 hours
  • Skill level All levels
  • Language English
  • Students 1442
  • Assessments Yes
  • Introduction 0/9

    • Lecture1.1
      Course Introduction
      6m
    • Lecture1.2
      Teaser
      7m
    • Lecture1.3
      What is Programming, What is Hacking & Why Learn Them
      6m
    • Lecture1.4
      Lab Overview & Needed Software
      3m
    • Lecture1.5
      Installing Kali as a virtual Machine
      8m
    • Lecture1.6
      Basic Overview of Kali Linux
      5m
    • Lecture1.7
      The Terminal & Linux Commands
      11m
    • Lecture1.8
      Python 2 VS Python 3 & Writing Our First Program
      9m
    • Lecture1.9
      Installing & Using a Python IDE
      9m
  • Writing a MAC Address Changer - Python Basics 0/13

    • Lecture2.1
      What is MAC Address & How To Change it
      8m
    • Lecture2.2
      Using Python Modules & Executing System Commands
      9m
    • Lecture2.3
      Implementing a Very Basic MAC Changer
      5m
    • Lecture2.4
      Variables & Strings
      10m
    • Lecture2.5
      Using Variables in MAC Changer
      4m
    • Lecture2.6
      Getting Input From The User
      6m
    • Lecture2.7
      Handling User Input
      10m
    • Lecture2.8
      Handling Command-line Arguments
      10m
    • Lecture2.9
      Initialising Variables Based on Command-line Arguments
      8m
    • Lecture2.10
      Functions
      10m
    • Lecture2.11
      Returning Values From Functions
      7m
    • Lecture2.12
      Decision Making – Theory
      7m
    • Lecture2.13
      Using Conditional Statements in MAC Changer
      9m
  • MAC Changer - Algorithm Design 0/6

    • Lecture3.1
      What is an Algorithm
      3m
    • Lecture3.2
      Reading Output Returned By System Commands
      6m
    • Lecture3.3
      Regular Expressions (Regex)
      8m
    • Lecture3.4
      Extracting a Substring Using Regex
      7m
    • Lecture3.5
      Refactoring & Housekeeping
      11m
    • Lecture3.6
      Implementing The Algorithm to Check The Mac Did Change
      6m
  • Programming a Network Scanner 0/15

    • Lecture4.1
      Introduction & Teaser
      10m
    • Lecture4.2
      Installing Windows as a Virtual Machine
      3m
    • Lecture4.3
      What is ARP & What its Used For?
      10m
    • Lecture4.4
      Designing an Algorithm To Discover Clients Connected To The Same Network
      4m
    • Lecture4.5
      Using Scapy To Create an ARP Request
      7m
    • Lecture4.6
      Combining Frames To Broadcast Packets
      9m
    • Lecture4.7
      Sending & Receiving Packets
      7m
    • Lecture4.8
      Lists
      8m
    • Lecture4.9
      Iterating Over Lists & Analysing Packet
      10m
    • Lecture4.10
      Using Escape Characters To Enhance Program Output
      6m
    • Lecture4.11
      Dictionaries
      10m
    • Lecture4.12
      Improving the Program Using a List of Dictionaries
      9m
    • Lecture4.13
      Iterating Over Nested Data Structures
      7m
    • Quiz4.1
      Get IP Range Using Command Line Arguments
      0 questions
    • Lecture4.14
      Python 3 Compatibility
      7m
  • Writing an ARP Spoofer 0/11

    • Lecture5.1
      What is ARP Spoofing?
      6m
    • Lecture5.2
      Redirecting the Flow of Packets in a Network Using arpspoof
      5m
    • Lecture5.3
      Creating an ARP Response
      7m
    • Lecture5.4
      Sending ARP Responses
      5m
    • Lecture5.5
      Extracting MAC Address From Responses
      7m
    • Lecture5.6
      Loops
      9m
    • Lecture5.7
      More on Loops & Counters
      8m
    • Lecture5.8
      Dynamic Printing
      7m
    • Lecture5.9
      Handling Exceptions
      5m
    • Lecture5.10
      Implementing a Restore Function
      12m
    • Lecture5.11
      Restoring ARP Tables When an Exception Occures
      5m
  • Writing a Packet Sniffer 0/7

    • Lecture6.1
      Introduction & Teaser
      4m
    • Lecture6.2
      Sniffing Packets Using Scapy
      7m
    • Lecture6.3
      Extracting data From a Specific Layer
      7m
    • Lecture6.4
      Analysing Sniffed Packets & Extracting Fields From Layers
      11m
    • Lecture6.5
      Analysing Fields & Extracting Passwords
      11m
    • Lecture6.6
      Extracting URLs
      8m
    • Lecture6.7
      Capturing Passwords From Any Computer Connected to the Same Network
      8m
  • Writing a DNS Spoofer 0/7

    • Lecture7.1
      Intercepting Packets – Creating a Proxy
      13m
    • Lecture7.2
      Converting Packets to Scapy Packets
      9m
    • Lecture7.3
      What is DNS Spoofing
      7m
    • Lecture7.4
      Filtering DNS Responses
      6m
    • Lecture7.5
      Analysing & Creating a Custom DNS Response
      8m
    • Lecture7.6
      Modifying Packets On The Fly
      8m
    • Lecture7.7
      Redirecting DNS Responses
      6m
  • Writing a File Interceptor 0/6

    • Lecture8.1
      Introduction & Teaser
      4m
    • Lecture8.2
      Filtering Traffic Based on the Port Used
      9m
    • Lecture8.3
      Analysing HTTP Requests
      5m
    • Lecture8.4
      Intercepting HTTP Requests
      10m
    • Lecture8.5
      Modifying HTTP Responses on The Fly
      11m
    • Lecture8.6
      Intercepting & Replacing Downloads on The Network
      9m
  • Writing a Code Injector 0/13

    • Lecture9.1
      Introduction & Teaser
      1m
    • Lecture9.2
      Analysing HTTP Responses
      7m
    • Lecture9.3
      Replacing a Substring Using Regex
      7m
    • Lecture9.4
      Decoding HTTP Responses
      10m
    • Lecture9.5
      Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
      9m
    • Lecture9.6
      Refactoring & Housekeeping
      8m
    • Lecture9.7
      Debugging Issues
      6m
    • Lecture9.8
      Using Groups & None-capturing Regex
      9m
    • Lecture9.9
      Recalculating Content Length
      11m
    • Lecture9.10
      BeEF Overview & Basic Hook Method
      7m
    • Lecture9.11
      Hooking Computers Using code_injector
      5m
    • Lecture9.12
      Basic BeEF Commands
      4m
    • Lecture9.13
      Delivering Malware Using BeEF
      6m
  • Bypassing HTTPS 0/4

    • Lecture10.1
      How to Bypass HTTPS
      11m
    • Lecture10.2
      Bypassing HTTPS & Sniffing Login Credentials
      8m
    • Lecture10.3
      Replacing Downloads on HTTPS Pages
      11m
    • Lecture10.4
      Injecting Code in HTTPS Pages
      8m
  • Writing an ARP Spoof Detector 0/3

    • Lecture11.1
      Running Python Programs on Windows
      10m
    • Lecture11.2
      Capturing & Analysing ARP Responses
      7m
    • Lecture11.3
      Detecting ARP Spoofing Attacks
      8m
  • Writing Malware 0/10

    • Lecture12.1
      Introduction & Teaser
      2m
    • Lecture12.2
      Execute System Command Payload
      10m
    • Lecture12.3
      Sending Reports By Email
      11m
    • Lecture12.4
      Filtering Command Output Using Regex
      10m
    • Lecture12.5
      Stealing WiFi Passwords Saved on a Computer
      9m
    • Lecture12.6
      Downloading Files From Program
      8m
    • Lecture12.7
      Writing Files on Disk
      11m
    • Lecture12.8
      Password Recovery Basics
      8m
    • Lecture12.9
      Using all the Above to Steal Saved Passwords Remotely
      8m
    • Lecture12.10
      Interacting With The File System
      10m
  • Writing Malware - Keylogger 0/8

    • Lecture13.1
      Introduction & Teaser
      4m
    • Lecture13.2
      Writing a Basic Local Keylogger
      10m
    • Lecture13.3
      Global Variables
      8m
    • Lecture13.4
      Logging Special Keys
      7m
    • Lecture13.5
      Threading & Recursion
      11m
    • Lecture13.6
      OOP – Object Oriented Programming Basics
      15m
    • Lecture13.7
      Constructor Methods & Instance Variables
      8m
    • Lecture13.8
      Logging Key-strikes and Reporting Them By Email
      12m
  • Writing Malware - Backdoors 0/21

    • Lecture14.1
      Introduction & Teaser
      6m
    • Lecture14.2
      Client – Server Communication & Connection Types
      8m
    • Lecture14.3
      Connecting Two Remote Computers Using Sockets
      10m
    • Lecture14.4
      Sending & Receiving Data Over TCP
      5m
    • Lecture14.5
      Executing System Commands Remotely
      10m
    • Lecture14.6
      Implementing a Server
      9m
    • Lecture14.7
      Implementing Skeleton For Server – Client Communication
      7m
    • Lecture14.8
      Refactoring – Creating a Listener Class
      8m
    • Lecture14.9
      Refactoring – Creating a Backdoor Class
      6m
    • Lecture14.10
      Serialisation – Theory
      11m
    • Lecture14.11
      Serialisation – Implementing Reliable Methods to Send & Receive Data Over TCP
      8m
    • Lecture14.12
      Serialisation – Reliably Sending & Receiving Data
      6m
    • Lecture14.13
      Sending Commands as List & Implementing Exit Command
      8m
    • Lecture14.14
      Interacting With the File System – Implementing “cd” Command
      9m
    • Lecture14.15
      Reading Files
      7m
    • Lecture14.16
      Writing Files
      7m
    • Lecture14.17
      Downloading Files From Hacked Computer
      8m
    • Lecture14.18
      Implementing Upload Functionality in Listener
      8m
    • Lecture14.19
      Implementing Upload Functionality in Backdoor
      6m
    • Lecture14.20
      Handling Unknown Exceptions
      10m
    • Lecture14.21
      Using the Backdoor to Hack Windows, Linux & OS X
      12m
  • Writing Malware - Packaging 0/15

    • Lecture15.1
      Introduction & Teaser
      3m
    • Lecture15.2
      Converting Python Programs To Windows Binary Executables
      7m
    • Lecture15.3
      Running Executables Silentely
      7m
    • Lecture15.4
      Installing Windows Pyinstaller on Linux
      8m
    • Lecture15.5
      Packaging Programs For Windows From Linux
      8m
    • Lecture15.6
      Persistence Idea
      8m
    • Lecture15.7
      Running Programs on Startup
      15m
    • Lecture15.8
      Creating a Basic Trojan Using Download & Execute Payload
      10m
    • Lecture15.9
      Creating a Trojan By Embedding Files In Program Code
      8m
    • Lecture15.10
      Bypassing Anti-Virus Programs – Theory
      5m
    • Lecture15.11
      Bypassing Anti-Virus Programs – Practical
      9m
    • Lecture15.12
      Adding an Icon to Generated Executables
      5m
    • Lecture15.13
      Spoofing File Extension
      9m
    • Lecture15.14
      Converting Python Programs To OS X Executables
      9m
    • Lecture15.15
      Converting Python Programs to Linux Executables
      7m
  • Website / Web Application Hacking 0/3

    • Lecture16.1
      Introduction & Teaser
      7m
    • Lecture16.2
      What is a Website
      4m
    • Lecture16.3
      How to Hack a Website
      5m
  • Website Hacking - Writing a Crawler 0/8

    • Lecture17.1
      Sending GET Requests To Web Servers
      10m
    • Lecture17.2
      Discovering Subdomains
      12m
    • Lecture17.3
      Discovering Hidden Paths in Websites
      11m
    • Lecture17.4
      Reading Response Content
      6m
    • Lecture17.5
      Extracting Useful Data From Response
      7m
    • Lecture17.6
      Filtering Rsults
      7m
    • Lecture17.7
      Extracting Unique Links & Storing Them In a List
      7m
    • Lecture17.8
      Recursively Discovering All Paths On a Target Website
      9m
  • Writing a Program To Guess Login Information 0/2

    • Lecture18.1
      Sending Post Requests to Websites
      12m
    • Lecture18.2
      Guessing Login Information on Login Pages
      9m
  • Writing a Vulnerability Scanner 0/15

    • Lecture19.1
      Introduction & Teaser
      2m
    • Lecture19.2
      HTTP Requests – POST VS GET
      7m
    • Lecture19.3
      Parsing HTML Code
      8m
    • Lecture19.4
      Extracting HTML Attributes
      10m
    • Lecture19.5
      Posting Forms
      10m
    • Lecture19.6
      Building Basic Structure For Vulnerability Scanner
      11m
    • Lecture19.7
      Using Default Parameters
      5m
    • Lecture19.8
      Sending Requests in a Session
      9m
    • Lecture19.9
      Extracting & Submitting Forms Automatically
      10m
    • Lecture19.10
      Implementing a Method To Run The Scanner
      6m
    • Lecture19.11
      Discovering XSS Vulnerabilities
      9m
    • Lecture19.12
      Exploiting XSS Vulnerabilities
      5m
    • Lecture19.13
      Implementing Code To Discover XSS in Forms
      8m
    • Lecture19.14
      Implementing Code To Discover XSS in Parameters
      8m
    • Lecture19.15
      Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
      9m
Avatar
Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. I studied computer science in University College Dublin, I graduated in may 2016. I have a very good experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty.org), I also worked as a pentester for the same company. In 2013 I started teaching my first course online in Arabic, this course received amazing feedback which motivated me to create an English version of this course. The english course became the most popular and the top paid course in Udemy for almost a year, this motivated me to make more courses on ethical hacking, now I have a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0
$195.00 $69.00