Python for CyberSecurity
About Course
Enhance your knowledge of ethical hacking, penetration testing, and network security through practical Python coding projects!
What Will You Learn?
- Enhance your knowledge of ethical hacking, penetration testing, and network security.
- Work on practical Python coding projects to apply your learning.
- Gain hands-on experience with vulnerability assessment.
- Learn about exploit development and secure coding practices.
Course Content
Introduction and Setup
-
Welcome to Python for ethical hacking!
-
Setup Environment
Port and Vulnerability Scanning
-
Coding a simple port scanner
-
Adding raw_input to our port scanner
-
Coding an advanced port scanner
-
Configuring IP address and installing Metasploitable
-
Coding a vulnerability scanner
SSH and FTP Attacks
-
Automating SSH login
-
Testing our SSH login program
-
Anonymous FTP login attack
-
Username & password list attack on FTP
Password Cracking
-
SHA256, SHA512, MD5
-
Cracking SHA1 hash with online dictionary
-
Getting password from MD5 hash
-
Cracking crypt passwords with salt
Network Analysis
-
Analyzing Ethernet header
-
Analyzing IP header
-
4. Analyzing TCP&UDP headers
Multi-functioning Reverse Shell
-
Theory behind socket programming
-
Wine and Pyinstaller installation
-
Setting up listener
-
Establishing connection between target and server
-
Implementing send & receive functions
-
Executing commands on target system
-
Importing JSON library to parse data
-
Converting Python backdoor to .exe
-
Using OS library to change directory
-
Downloading & uploading files to target PC
-
Hiding our backdoor and creating persistence
-
Trying to connect to server every 20 seconds
-
Downloading files to target PC
-
Capturing screenshot on target PC
-
Administrator privilege check
-
Starting other programs with our shell
-
Running our shell as an image, audio, PDF
Command and Control Center
-
What is a threaded server
-
Accepting connections with a thread
-
Managing multiple sessions
-
Testing threaded server with Windows 10 target
-
Fixing Q command
-
Coding exit function
-
Attacking multiple targets and gathering botnet
Student Ratings & Reviews
No Review Yet