Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Learn Python and Ethical Hacking from Scratch


Introduction :
Introduction
Teaser
What is Programming, what is Hacking and Why learn Them
Lab Overview & Needed Software
Installing Kali 2019 as a virtual Machine
Basic Overview of Kali Linux
The Terminal & Linux Commands
Python 2 VS Python 3 & Writing Our First Program
Installing & Using a Python IDE

Writing a MAC Address Changer - Python Basics :
What is MAC Address & How to Change it
Using Python Modules & Executing System Commands
Implementing a Very Basic MAC Changer
Variables & Strings
Using Variables in MAC Changer
Getting Input from The User
Handling User Input
Handling Command-line Arguments
Initializing Variables Based on Command-line Arguments
Functions
Returning Values from Functions
Decision Making - Theory
Using Conditional Statements in MAC Changer

MAC Changer - Algorithm Design :
What is an Algorithm
Reading Output Returned by System Commands
Regular Expressions (Regex)
Extracting a Substring Using Regex
Refactoring & Housekeeping
Implementing the Algorithm to Check the Mac Did Change

Programming a Network Scanner :
Introduction & Teaser
Installing Windows as a Virtual Machine
What is ARP & What its Used For?
Designing an Algorithm to Discover Clients Connected to The Same Network
Using Scapy To Create an ARP Request
Combining Frames to Broadcast Packets
Sending & Receiving Packets
Lists
Iterating Over Lists & Analyzing Packet
Using Escape Characters to Enhance Program Output
Dictionaries
Improving the Program Using a List of Dictionaries
Iterating Over Nested Data Structures
Python 3 Compatibility

Writing an ARP Spoofer :
What is ARP Spoofing?
Redirecting the Flow of Packets in a Network Using arpspoof
Creating an ARP Response
Sending ARP Responses
Extracting MAC Address from Responses
Loops
More on Loops & Counters
Dynamic Printing
Handling Exceptions
Implementing a Restore Function
Restoring ARP Tables When an Exception Occurs

Writing a Packet Sniffer :
Introduction & Teaser
Sniffing Packets Using Scapy
Extracting data From a Specific Layer
Analyzing Sniffed Packets & Extracting Fields from Layers
Analyzing Fields & Extracting Passwords
Extracting URLs
Capturing Passwords from Any Computer Connected to the Same Network

Writing a DNS Spoofer :
Intercepting Packets - Creating a Proxy
Converting Packets to Scapy Packets
What is DNS Spoofing
Filtering DNS Responses
Analysing & Creating a Custom DNS Response
Modifying Packets on The Fly
Redirecting DNS Responses

Writing a File Interceptor :
Introduction & Teaser
Filtering Traffic Based on the Port Used
Analysing HTTP Requests
Intercepting HTTP Requests
Modifying HTTP Responses on The Fly
Intercepting & Replacing Downloads on The Network

Writing a Code Injector :
Introduction & Teaser
Analysing HTTP Responses
Replacing a Substring Using Regex
Decoding HTTP Responses
Modifying HTTP Responses & Injecting JavaScript Code in HTML Pages
Refactoring & Housekeeping
Debugging Issues
Using Groups & None-capturing Regex
Recalculating Content Length
BeEF Overview & Basic Hook Method
Hooking Computers Using code_injector
Basic BeEF Commands
Delivering Malware Using BeEF

Bypassing HTTPS :
How to Bypass HTTPS
Bypassing HTTPS & Sniffing Login Credentials
Replacing Downloads on HTTPS Pages
Injecting Code in HTTPS Pages

Writing an ARP Spoof Detector :
Running Python Programs on Windows
Capturing & Analysing ARP Responses
Detecting ARP Spoofing Attacks

Writing Malware :
Introduction & Teaser
Execute System Command Payload
Sending Reports by Email
Filtering Command Output Using Regex
Stealing WiFi Passwords Saved on a Computer
Downloading Files from Program
Writing Files on Disk
Password Recovery Basics
Using all the Above to Steal Saved Passwords Remotely
Interacting with The File System

Writing Malware - Keylogger :
Introduction & Teaser
Writing a Basic Local Keylogger
Global Variables
Logging Special Keys
Threading & Recursion
OOP - Object Oriented Programming Basics
Constructor Methods & Instance Variables
Logging Key-strikes and Reporting Them by Email

Writing Malware - Backdoors :
Introduction & Teaser
Client - Server Communication & Connection Types
Connecting Two Remote Computers Using Sockets
Sending & Receiving Data Over TCP
Executing System Commands Remotely
Implementing a Server
Implementing Skeleton for Server - Client Communication
Refactoring - Creating a Listener Class
Refactoring - Creating a Backdoor Class
Serialisation - Theory
Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP
Serialisation - Reliably Sending & Receiving Data
Sending Commands as List & Implementing Exit Command
Interacting with the File System - Implementing 'cd' Command
Reading Files
Writing Files
Downloading Files from Hacked Computer
Implementing Upload Functionality in Listener
Implementing Upload Functionality in Backdoor
Handling Unknown Exceptions
Using the Backdoor to Hack Windows, Linux & OS X

Writing Malware - Packaging :
Introduction & Teaser
Converting Python Programs to Windows Binary Executables
Running Executables Silentely
Installing Windows Pyinstaller on Linux
Packaging Programs for Windows From Linux
Persistence Idea
Running Programs on Startup
Creating a Basic Trojan Using Download & Execute Payload
Creating a Trojan By Embedding Files in Program Code
Bypassing Anti-Virus Programs - Theory
Bypassing Anti-Virus Programs - Practical
Adding an Icon to Generated Executables
Spoofing File Extension
Converting Python Programs to OS X Executables
Converting Python Programs to Linux Executables

Website / Web Application Hacking :
Introduction & Teaser
What is a Website
How to Hack a Website

Website Hacking - Writing a Crawler :
Sending GET Requests to Web Servers
Discovering Subdomains
Discovering Hidden Paths in Websites
Reading Response Content
Extracting Useful Data from Response
Filtering Results
Extracting Unique Links & Storing Them in a List
Recursively Discovering All Paths on a Target Website

Writing a Program to Guess Login Information :
Sending Post Requests to Websites
Guessing Login Information on Login Pages

Writing a Vulnerability Scanner :
Introduction & Teaser
HTTP Requests - POST VS GET
Parsing HTML Code
Extracting HTML Attributes
Posting Forms
Building Basic Structure for Vulnerability Scanner
Using Default Parameters
Sending Requests in a Session
Extracting & Submitting Forms Automatically
Implementing a Method to Run the Scanner
Discovering XSS Vulnerabilities
Exploiting XSS Vulnerabilities
Implementing Code to Discover XSS in Forms
Implementing Code to Discover XSS in Parameters
Automatically Discovering Vulnerabilities Using the Vulnerability Scanner