Curriculum
- Introduction
- Teaser
- Course Introduction
- Introduction to Python Programming & Ethical Hacking
- Initial Overview
- Initial Preparation
- Installing Kali Linux as a VM on Windows
- Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)
- Installing Kali Linux as a VM on Linux
- Basic Overview of Kali Linux
- The Terminal & Linux Commands
- Python 2 VS Python 3 & Writing Our First Program
- Installing & Using a Python IDE
- Writing a MAC Address Changer - Python Basics
- What is MAC Address & How To Change it
- Using Python Modules & Executing System Commands
- Implementing a Very Basic MAC Changer
- Variables & Strings
- Using Variables in MAC Changer
- Getting Input From The User
- Handling User Input
- Handling Command-line Arguments
- Initialising Variables Based on Command-line Arguments
- Python Functions
- Returning Values From Functions
- Decision Making in Python
- Using Conditional Statements in MAC Changer
- MAC Changer - Algorithm Design
- Programming a Network Scanner
- Introduction & Teaser
- Installing Windows as a Virtual Machine
- Installing Windows as a Virtual Machine on Apple Silicon Computers
- Introduction to ARP
- Designing an Algorithm To Discover Clients Connected To The Same Network
- Using Scapy To Create an ARP Request
- Combining Frames To Broadcast Packets
- Sending & Receiving Packets
- Introduction Lists in Python
- Iterating Over Lists & Analysing Packet
- Using Escape Characters To Enhance Program Output
- Introduction to Dictionaries in Python
- Improving the Program Using a List of Dictionaries
- Iterating Over Nested Data Structures
- Assignment 1: Get IP Range Using Command Line Arguments
- Assignment 1 (solution): Get IP Range Using Command Line Arguments – solution
- Testing The Network Scanner With Python 3
- Writing an ARP Spoofer
- What is ARP Spoofing?
- Intercepting Data in a Network Using arpspoof
- Creating an ARP Response
- Sending ARP Responses
- Extracting MAC Address From Responses
- Introduction to Loops in Python
- More on Loops & Counters
- Dynamic Printing
- Exception Handling in Python
- Implementing a Restore Function
- Restoring ARP Tables on Exception
- Assignment 2: Fix Dynamic Printing
- Assignment 2 (solution): Fix Dynamic Printing
- Writing a Packet Sniffer
- Writing a DNS Spoofer
- Intercepting Packets – Creating a Proxy
- Converting Packets to Scapy Packets
- Introduction to DNS Spoofing
- Filtering DNS Responses
- Analysing & Creating a Custom DNS Response
- Modifying Packets On The Fly
- Redirecting DNS Responses
- Assignment 3: Conversion Between Strings & Bytes
- Assignment 3 (solution): Conversion Between Strings & Bytes
- Writing a File Interceptor
- Introduction & Teaser
- Filtering Traffic Based on the Port Used
- Analysing HTTP Requests
- Intercepting HTTP Requests
- Modifying HTTP Responses on The Fly
- Intercepting & Replacing Downloads on The Network
- Assignment 4: Testing The File Interceptor With Python 3
- Assignment 4 (solution): Testing The File Interceptor With Python 3
- Writing a Code Injector
- Introduction & Teaser
- Analysing HTTP Responses
- Replacing a Substring Using Regex
- Decoding HTTP Responses
- Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
- Refactoring & Housekeeping
- Debugging Issues in Python
- Using Groups & None-capturing Regex
- Recalculating Content Length
- Assignment 5: Test The Code Injector With Python 3
- Assignment 5 (solution): Test The Code Injector With Python 3
- BeEF Overview & Basic Hook Method
- Hooking Computers Using code_injector
- Basic BeEF Commands
- Delivering Malware Using BeEF
- Bypassing HTTPS
- Writing an ARP Spoof Detector
- Writing Malware
- Introduction & Teaser
- Execute System Command Payload
- Sending Emails Using Python
- Filtering Command Output Using Regex
- Stealing WiFi Passwords Saved on a Computer
- Downloading Files Using Python
- Writing Files on Disk
- Password Recovery Basics
- Stealing Saved Passwords From Remote Computers
- Interacting With The File System Using Python
- Writing Malware - Keylogger
- Writing Malware - Backdoors
- Introduction & Teaser
- Client – Server Communication & Connection Types
- Connecting Two Remote Computers Using Sockets
- Sending & Receiving Data Over TCP
- Executing System Commands Remotely
- Implementing a Server
- Implementing Skeleton For Server – Client Communication
- Refactoring – Creating a Listener Class
- Refactoring – Creating a Backdoor Class
- Serialisation – Theory
- Serialisation – Implementing Reliable Methods to Send & Receive Data Over TCP
- Serialisation – Reliably Sending & Receiving Data
- Sending Commands as List & Implementing Exit Command
- Interacting With the File System – Implementing “cd” Command
- Reading Files Using Python
- Writing Files Using Python
- Downloading Files From Hacked Computer
- Implementing Upload Functionality in Listener
- Implementing Upload Functionality in Backdoor
- Handling Unknown Exceptions
- Using the Backdoor to Hack Windows, Linux & OS X
- Writing Malware - Packaging
- Introduction & Teaser
- Converting Python Programs To Windows Binary Executables
- Running Executables Silently
- Installing Windows Pyinstaller on Linux
- Packaging Programs For Windows From Linux
- Introduction to Persistence
- Running Programs on Startup
- Creating a Basic Trojan Using Download & Execute Payload
- Creating a Trojan By Embedding Files In Program Code
- Bypassing Anti-Virus Programs – Theory
- Bypassing Anti-Virus Programs – Practical
- Adding an Icon to Generated Executables
- Spoofing File Extension
- Converting Python Programs To OS X Executables
- Converting Python Programs to Linux Executables
- Website / Web Application Hacking
- Website Hacking - Writing a Crawler
- Sending GET Requests To Web Servers
- Discovering Website Subdomains Using Python
- Discovering Hidden Paths in Websites
- Reading Response Content
- Extracting Useful Data From Response
- Filtering Results
- Extracting Unique Links & Storing Them In a List
- Recursively Discovering All Paths On a Target Website
- Testing The Crawler With Python 3
- Writing a Program To Guess Login Information
- Writing a Vulnerability Scanner
- Introduction & Teaser
- HTTP Requests – POST VS GET
- Parsing HTML Code Using Python
- Extracting HTML Attributes
- Posting Forms
- Building Basic Structure For Vulnerability Scanner
- Using Default Parameters
- Sending Requests in a Session
- Extracting & Submitting Forms Automatically
- Implementing a Method To Run The Scanner
- Discovering XSS Vulnerabilities
- Exploiting XSS Vulnerabilities
- Implementing Code To Discover XSS in Forms
- Implementing Code To Discover XSS in Parameters
- Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
- Assignment 7: Test The Vulnerability Scanner With Python 3
- Assignment 7 (solution): Test The Vulnerability Scanner With Python 3
- Bonus Section
Msytix
Thank you
Fantastic work, very helpful. I saw you on YouTube and had to see your training videos, I must say it was the best decision I've done in a long time.FlashSn0w
One if the best courses ever
Super cool course which not only teach you how to hack(of course ethically) but also how you can build your own hacking tools. This is the main reason why I prefer buying it instead of the regular Ethical Hacking course because I think this course gives much more knowledge than the other ethical hacking course. Thank you a lot, Zaid! Your method of teaching makes me want to learn more and more.