![Learn Python and Ethical Hacking from Scratch [Video]](https://content.packt.com/V15319/cover_image_small.jpeg)
Learn Python and Ethical Hacking from Scratch [Video]
Subscription
FREE
Video
$17.99
What do you get with a Packt Subscription?
What do you get with a Packt Subscription?
What do you get with Video + Subscription?
What do you get with a Packt Subscription?
What do you get with eBook?
What do I get with Print?
What do you get with video?
What do you get with Audiobook?
Subscription
FREE
Video
$17.99
What do you get with a Packt Subscription?
What do you get with a Packt Subscription?
What do you get with Video + Subscription?
What do you get with a Packt Subscription?
What do you get with eBook?
What do I get with Print?
What do you get with video?
What do you get with Audiobook?
-
Free ChapterIntroduction
- Introduction
- Teaser
- Introduction to Python Programming and Ethical Hacking
- Lab Overview
- Initial Preparation
- Installing Kali Linux as a VM on Windows
- Installing Kali Linux as a VM on Apple Mac OS
- Installing Kali Linux as a VM on Linux
- Basic Overview of Kali Linux
- Terminal and Linux Commands
- Python 2 Versus Python 3 and Writing Your First Program
- Installing and Using a Python Integrated Development Environment (IDE)
-
Writing a Media Access Control (MAC) Address Changer - Python Basics
- What is Media Access Control (MAC) Address and How to Change it?
- Using Python Modules and Executing System Commands
- Implementing a very Basic Media Access Control (MAC) Changer
- Variables and Strings
- Using Variables in a Media Access Control (MAC) Changer
- Getting Input from the User
- Handling User Input
- Handling Command-Line Arguments
- Initializing Variables Based on Command-Line Arguments
- Functions in Python
- Returning Values from Functions
- Decision Making in Python
- Using Conditional Statements in Media Access Control (MAC) Changer
-
Media Access Control (MAC) Changer - Algorithm Design
-
Programming a Network Scanner
- Introduction and Teaser
- Installing Windows as a Virtual Machine
- What is the Address Resolution Protocol (ARP) and What is it Used For?
- Designing an Algorithm to Discover Clients Connected to the Same Network
- Using Scapy to Create an Address Resolution Protocol (ARP) Request
- Combining Frames to Broadcast Packets
- Sending and Receiving Packets
- Introduction to Lists in Python
- Iterating over Lists and Analyzing Packet
- Using Escape Characters to Enhance Program Output
- Dictionaries
- Improving the Program Using a List of Dictionaries
- Iterating over Nested Data Structures
- Testing the Network Scanner With Python 3
-
Writing an Address Resolution Protocol (ARP) Spoofer
- What is Address Resolution Protocol (ARP) Spoofing?
- Redirecting the Flow of Packets in a Network Using arpspoof
- Creating an Address Resolution Protocol (ARP) Response
- Sending Address Resolution Protocol (ARP) Responses
- Extracting Media Access Control (MAC) Address from Responses
- Loops
- More on Loops and Counters
- Dynamic Printing
- Handling Exceptions
- Implementing a Restore Function
- Restoring Address Resolution Protocol (ARP) Tables When an Exception Occurs
-
Writing a Packet Sniffer
- Introduction and Teaser
- Sniffing Packets Using Scapy
- Extracting Data from a Specific Layer
- Analyzing Sniffed Packets and Extracting Fields from Layers
- Analyzing Fields and Extracting Passwords
- Extracting URLs
- Capturing Passwords from any Computer Connected to the Same Network
- Strings and Bytes in Python 3
-
Writing a Domain Name Server (DNS) Spoofer
- Intercepting Packets - Creating a Proxy
- Converting Packets to Scapy Packets
- What is Domain Name Server (DNS) Spoofing?
- Filtering Domain Name Server (DNS) Responses
- Analyzing and Creating a Custom Domain Name Server (DNS) Response
- Modifying Packets on the Fly
- Redirecting Domain Name Server (DNS) Responses
-
Writing a File Interceptor
-
Writing a Code Injector
- Introduction and Teaser
- Analyzing HTTP Responses
- Replacing a Substring Using Regex
- Decoding HTTP Responses
- Modifying HTTP Responses and Injecting JavaScript Code in HTML Pages
- Refactoring and Housekeeping
- Debugging Issues
- Using Groups and Non-Capturing Regex
- Recalculating Content Length
- Browser Exploitation Framework (BeEF) Overview and Basic Hook Method
- Hooking Computers Using Code Injector
- Basic Browser Exploitation Framework (BeEF) Commands
- Delivering Malware Using the Browser Exploitation Framework (BeEF)
-
Bypassing HTTPS
-
Writing an Address Resolution Protocol (ARP) Spoof Detector
-
Writing Malware
- Introduction
- Executing a System Command Payload
- Sending Reports by Email
- Filtering Command Output Using Regex
- Stealing Wi-Fi Passwords Saved on a Computer
- Downloading Files from a Program
- Writing Files on a Disk
- Password Recovery Basics
- Using All the Above to Steal Saved Passwords Remotely
- Interacting with the File System
-
Writing Malware - Keylogger
-
Writing Malware – Backdoors
- Introduction and Teaser
- Client-Server Communication and Connection Types
- Connecting Two Remote Computers Using Sockets
- Sending and Receiving Data over Transmission Control Protocol (TCP)
- Executing System Commands Remotely
- Implementing a Server
- Implementing Skeleton for Server-Client Communication
- Refactoring – Creating a Listener Class
- Refactoring – Creating a Backdoor Class
- Serialization – Theory
- Serialization - Implementing Reliable Methods to Send and Receive Data over Transmission Control Protocol (TCP)
- Serialization – Reliably Sending and Receiving Data
- Sending Commands as List and Implementing the Exit Command
- Interacting with the File System – Implementing the "cd" Command
- Reading Files
- Writing Files
- Downloading Files from a Hacked Computer
- Implementing Upload Functionality Using Listener
- Implementing Upload Functionality Using Backdoor
- Handling Unknown Exceptions
- Using the Backdoor to Hack Windows, Linux, and OS X
- Testing the Backdoors with Python 3.
-
Writing Malware – Packaging
- Introduction and Teaser
- Converting Python Programs to Windows Binary Executables
- Running Executables Silently
- Installing Windows PyInstaller on Linux
- Packaging Programs for Windows from Linux
- Persistence Idea
- Running Programs on Startup
- Creating a Basic Trojan Using the Download and Execute Payload
- Creating a Trojan by Embedding Files in Program Code
- Bypassing Anti-Virus Programs – Theory
- Bypassing Anti-Virus Programs - Practical
- Adding an Icon to Generated Executables
- Spoofing File Extension
- Converting Python Programs to OS X Executables
- Converting Python Programs to Linux Executables
-
Website/Web Application Hacking
-
Website Hacking - Writing a Crawler
- Sending GET Requests to Web Servers
- Discovering Subdomains
- Discovering Hidden Paths on Websites
- Reading Response Content
- Extracting Useful Data from Responses
- Filtering Results
- Extracting Unique Links and Storing Them in a List
- Recursively Discovering All Paths on a Target Website
- Testing the Crawler with Python 3
-
Writing a Program to Guess Login Information
-
Writing a Vulnerability Scanner
- Introduction and Teaser
- HTTP Requests – POST versus GET
- Parsing the HTML Code
- Extracting HTML Attributes
- Posting Forms
- Building Basic Structure for a Vulnerability Scanner
- Using Default Parameters
- Sending Requests in a Session
- Extracting and Submitting Forms Automatically
- Implementing a Method to Run the Scanner
- Discovering Cross-Site Scripting (XSS) Vulnerabilities
- Exploiting Cross-Site Scripting (XSS) Vulnerabilities
- Implementing Code to Discover Cross-Site Scripting (XSS) in Forms
- Implementing Code to Discover Cross-Site Scripting (XSS) in Parameters
- Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
About this video
Are you intrigued by how hackers hack into any computer system easily? Do you want to develop the same skills, but not sure where to start? Don’t worry! This course has got you covered. By combining the power of Python and ethical hacking skills, this course shows you how to write Python programs to break into any computer system with ease.
The course starts with the fundamentals of ethical hacking and Python programming and guides you through the installation process of the software needed. Once the setup is ready, you will learn Python programming from scratch and start writing hacking programs without any delay. You will learn how a system works and find its weaknesses and will learn how to then write a Python program to exploit those weaknesses to hack the system.
To master the craft of hacking, you will learn to write ethical hacking programs from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools, the list goes on. You will also have gained a deep understanding of how computer systems work and how to model problems, design an algorithm to solve problems, and implement solutions using Python.
By the end of this course, you will be well-versed with Python programming and will have developed the skills to write programs in Python to hack a system.
All the code files are placed at https://github.com/PacktPublishing/Learn-Python-and-Ethical-Hacking-From-Scratch
- Publication date:
- October 2019
- Publisher
- Packt
- Duration
- 24 hours 35 minutes
- ISBN
- 9781839214561
Latest Reviews
(1 reviews total)