X

Python and Ethical Hacking: A Complete Cybersecurity Course - 10.9 GB

English Tutorials and Courses

 
  • Filter
  • Time
  • Show
Clear All
new posts
  • :: التـ ج ــا ::
    Thread Author
    VIP
    • Nov 2018 
    • 1256 
    • 1,768 
    • 1,896 

    IT & SoftwareNetwork & SecurityEthical Hacking


    Python and Ethical Hacking: A Complete Cybersecurity Course

    Become an Ethical Hacker and Learn: Network Security, Pentesting, python tools, Exploit | No prior knowledge required
    Rating: 4.4 out of 54.4(95 ratings)
    9,920 students
    Created by Neamatullah Ekhteyari
    Last updated 2‏/2024
    English

    English, German

    ===========
    What you'll learn
    • Introduction to Ethical Hacking
    • Understand the foundations, ethics, and legal aspects of ethical hacking.
    • Hacking Lab Setup.: Set up your own secure hacking laboratory using virtualization technologies like VirtualBox.
    • Install Windows and Kali Linux virtual machines while creating snapshots for easy system restore.
    • Kali Linux Basics:: Explore the essentials of Kali Linux, including basic commands and password management.
    • Network Pentesting:
    • Network Pentesting: Gain insights into network architecture and MAC addresses.
    • Deploy various wireless modes and explore network penetration testing.
    • Gathering Information from Networks: Learn packet sniffing techniques and employ tools like Airodump-ng for targeted packet sniffing.
    • Wireless Attacks: Master wireless attack strategies, such as fake authentication and WPA&WPA2 cracking.
    • Post Connection Attack: Utilize tools like Netdiscover, Zenmap, and Wireshark for post-connection attacks.
    • Explore hacking techniques on Windows and Android platforms.
    • Detection and Security: Detect ARP poisoning and suspicious activities using Wireshark.
    • Leverage Netdiscover with Netstalker for enhanced network security.
    • Gaining Access: Discover vulnerabilities in systems and exploit them using various techniques.
    • Attacks on Users: Create and test backdoors using Veil.
    • Achieve full control over Windows 10 and Android devices.
    • Beef
    • An introduction to the Browser Exploitation Framework (BeEF) and its capabilities.
    • Learn how to hook targets and extract passwords from different platforms.
    • Post Exploitation: Develop trojans with customizable icons, download/upload files, and capture keylogs.
    • Establish sustainable sessions within compromised systems.
    • Ethical Hacking Blueprint: Understand the ethical hacking blueprint and its importance in planning assessments.
    • Information Gathering: Utilize Netcraft and web crawlers for extensive information gathering.
    • Website Pentesting: Explore vulnerabilities such as code execution, file inclusion, and remote file inclusion.
    • MySQL: Familiarize yourself with MySQL and practice fundamental commands for data manipulation.
    • SQL Injection: Discover and exploit SQL injection vulnerabilities in both GET and POST methods.
    • Leverage tools like SQLMap for advanced exploitation.
    • Python Basics: Grasp the fundamentals of Python programming language required for hacking tasks.
    • Changing MAC Address with Python
    • Learn how to change MAC addresses programmatically using Python.
    • Mac Changer Algorithm Design: Understand the algorithm design for a MAC address changer using Python.
    • Network Scanner with Python: Build a network scanner tool using Python for scanning and enumerating network devices.
    • Writing an ARP Spoofer with Python: Create an ARP spoofer using Python to intercept network traffic.
    • Writing a Packet Sniffer with Python: Develop a packet sniffer using Python to capture and analyze network packets.
    • Writing a Packet Sniffer Detector with Python: Learn to build a packet sniffer detector using Python to detect suspicious network activities.
    • Writing Malware: Keylogger with Python
    • Build a keylogger malware using Python to capture keystrokes on a target system.
    • Backdoors: Explore techniques for creating backdoor malware for unauthorized access to systems.
    • Packaging with Python: Understand how to package Python programs into standalone executables for distribution.
    • Website Hacking with Python: Leverage Python for web application hacking and exploit various vulnerabilities.
    • Guess Login Password with Python: Develop a script in Python to perform brute-force attacks for guessing login passwords.
    • Writing a Vulnerability Scanner with Python: Create a vulnerability scanner using Python to identify and assess system vulnerabilities.
    • =====================


    ====================pass:damaswiki.net====================
    *
    =========================================
  • Thinkswer
    VIP
    • May 2021 
    • 2570 
    • 3,753 
    • 511 

    #2
    جزاكم الله خيرا
    Comment
    Working...
    X