The Complete Python Hacking Course: Beginner to Advanced!

BY
Eduonix

While focusing on Python coding projects, you will learn the fundamentals of ethical hacking, penetration testing, and network security.

Mode

Online

Fees

₹ 199 995

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

The Complete Python Hacking Course: Beginner to Advanced online course is designed for individuals who want to work on real Python coding projects. The course aims to teach individuals about ethical hacking and penetration testing from the ground up. Although this course is developed for students interested in intermediate to advanced level ethical hacking tutorials, it is still presented in a step-by-step, beginner-friendly manner. The Complete Python Hacking Course: Beginner to Advanced certification course is Joseph Delgadillo - Founder of JTDigital Courses, Web Developer & Best-Selling Instructor and presented by Eduonix, an ed-tech firm providing skills development courses and career guidance through its courses. 

The Complete Python Hacking Course: Beginner to Advanced online training includes more than 17 hours of HD video content covering topics such as an introduction to Python and ethical hacking, as well as concepts such as ports, vulnerability scanning, types of attacks such as SSH and FTP, password cracking, sniffers, flooders, spoofers (including DNS spoofing), analysing networks, programming a multifunctional reverse shell, keyloggers, command and control centres, and penetration testing. Students who enroll in the course will also get access to discussion forums for one-on-one help. Students are also advised not to utilize ethical hacking techniques on devices that do not belong to them to avoid legal action.

The highlights

  • Self-paced course
  • English videos with subtitles
  • 17.36 Pre-recorded video content
  • 89 online lectures
  • Access to discussion forums
  • 30-day money-back guarantee
  • Accessible on portable devices

Program offerings

  • Self-paced course
  • English videos with subtitles
  • 17.36 hours of pre-recorded video content
  • 89 online lectures
  • Access to discussion forums
  • 30-day money-back guarantee
  • Accessible on portable devices

Course and certificate fees

Fees information
₹ 199  ₹995
certificate availability

No

Who it is for

What you will learn

Knowledge of python Knowledge of network packet analysis Ethical hacking

After completing The Complete Python Hacking Course: Beginner to Advanced online certification, students will study the fundamentals of Python programming and ethical hacking. Students will learn how to set up a Linux system for building a hacking environment using virtual boxes to code, compile, and run code and how to develop tools for ethical hacking attacks. Students will also learn about brute force attacks, exploits, backdoors, and keyloggers, as well as how to write code port scanners and reverse shells.

The syllabus

Introduction and Setup

  • Welcome to Python for ethical hacking! 
  • VirtualBox installation
  • Kali Linux installation
  • Adding Guest Additions
  • Python in Kali terminal

Port and Vulnerability Scanning

  • Coding a simple port scanner
  • Adding raw_input to our port scanner
  • Scanning the first 1,000 ports
  • Coding an advanced port scanner part 1
  • Coding an advanced port scanner part 2
  • Finishing and testing our scanner
  • Configuring IP address and installing Metasploitable
  • Returning banner from open port
  • Coding a vulnerability scanner part 1
  • Coding a vulnerability scanner part 2

SSH and FTP Attacks

  • Automating SSH login part 1
  • Automating SSH login part 2
  • Testing our SSH login program
  • Coding a SSH brute-forcer
  • Executing commands on target after brute-forcing SSH
  • Anonymous FTP login attack
  • Username & password list attack on FTP

Password Cracking

  • SHA256, SHA512, MD5
  • Cracking SHA1 hash with online dictionary
  • Getting password from MD5 hash
  • Cracking crypt passwords with salt

Sniffers, Flooders and Spoofers

  • Changing MAC address manually
  • Coding MAC address changer
  • Theory behind ARP spoofing
  • Crafting malicious ARP packet
  • Coding ARP spoofer
  • Forwarding packets and restoring ARP tables
  • Spoofing our IP address and sending message with TCP payload
  • Running SynFlooder with changed source IP address
  • Getting source and destination MAC address from received packets
  • Sniffing FTP username and password part 1
  • Sniffing FTP username and password part 2
  • Getting passwords from HTTP websites

Coding DNS Spoofer

  • Cloning any webpage
  • Printing DNS queries
  • Redirecting response to cloned page
  • Setting IP table rules and running DNS spoofer

Network Analysis

  • Analyzing Ethernet header
  • Analyzing IP header part 1
  • Analyzing IP header part 2
  • Analyzing TCP header
  • Analyzing UDP header

Multi-functioning Reverse Shell

  • Theory behind socket programming
  • Wine and Pyinstaller installation
  • Setting up listener
  • Establishing connection between target and server
  • Implementing send & receive functions
  • Executing commands on target system
  • Importing JSON library to parse data
  • Converting Python backdoor to .exe
  • Using OS library to change directory
  • Downloading & uploading files to target PC
  • Hiding our backdoor and creating persistence
  • Trying to connect to server every 20 seconds
  • Downloading files to target PC
  • Capturing screenshot on target PC
  • Administrator privilege check
  • Starting other programs with our shell
  • Running our shell as an image, audio, PDF

Coding a Keylogger

  • Installing Pynput
  • Printing space character
  • Calling timer on our keylogger
  • Adding keylogger to our backdoor

Command and Control Center

  • What is a threaded server?
  • Accepting connections with a thread
  • Managing multiple sessions
  • Testing threaded server with Windows 10 target
  • Fixing Q command
  • Coding exit function
  • Attacking multiple targets and gathering botnet

Website Penetration Testing

  • Stealing saved wireless passwords
  • Saving passwords to a file
  • Bruteforcing Gmail
  • Bruteforcing any login page part 1
  • Bruteforcing any login page part 2
  • Finding hidden directories part 1
  • Finding hidden directories part 2
    Discovering subdomains
  • Changing HTTP headers
  • Starting basic and digest authentication bruteforcer
  • Controlling threads
  • Coding run function
  • Printing usage and testing our program
  • Taking a look at ransomware

Instructors

Mr Joseph Delgadillo

Mr Joseph Delgadillo
Instructor
Eduonix

Articles

Popular Articles

Latest Articles

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books