Learn Python & Ethical Hacking From Scratch [Course]

[LMS] Nội dung bài học từ đầu đến cuối Lesson 1 – Lesson 175 với hơn 23 giờ đào tạo lý thuyết + thực hành. Các bạn hãy đăng nhập hệ thống tải lab pycharm và tham khảo các bài học {click mổ tab mới trên mỗi bài học}. Khóa học được trình bày rất dễ hiểu và basic nhưng vẫn cần một số kiến thức nền tảng về mạng máy tính, tcp /ip …

(Học phí 200K cho tài khoản học tập 12 tháng) Liên hệ đăng kí học tại đây.

Lesson 1. Introduction
Lesson 2. Teaser
Lesson 3. What is Programming, What is Hacking & Why Learn Them
Lesson 4. Lab Overview & Needed Software
Lesson 5. Installing Kali as a virtual Machine
Lesson 6. Basic Overview of Kali Linux
Lesson 7. The Terminal & Linux Commands
Lesson 8. Python 2 VS Python 3 & Writing Our First Program
Lesson 9. Installing & Using a Python IDE
Lesson 10. What is MAC Address & How To Change it

Lesson 11. Using Python Modules & Executing System Commands
Lesson 12. Implementing a Very Basic MAC Changer
Lesson 13. Variables & Strings
Lesson 14. Using Variables in MAC Changer
Lesson 15. Getting Input From The User
Lesson 16. Handling User Input
Lesson 17. Handling Command-line Arguments
Lesson 18. Initialising Variables Based on Command-line Arguments
Lesson 19. Functions
Lesson 20. Returning Values From Functions

Lesson 21. Decision Making – Theory
Lesson 22. Using Conditional Statements in MAC Changer
Lesson 23. What is an Algorithm
Lesson 24. Reading Output Returned By System Commands
Lesson 25. Regular Expressions (Regex)
Lesson 26. Extracting a Substring Using Regex
Lesson 27. Refactoring & Housekeeping
Lesson 28. Implementing The Algorithm to Check The Mac Did Change
Lesson 29. Introduction & Teaser
Lesson 30. Installing Windows as a Virtual Machine

Lesson 31. What is ARP & What its Used For
Lesson 32. Designing an Algorithm To Discover Clients Connected To The Same Network
Lesson 33. Using Scapy To Create an ARP Request
Lesson 34. Combining Frames To Broadcast Packets
Lesson 35. Sending & Receiving Packets
Lesson 36. Lists
Lesson 37. Iterating Over Lists & Analysing Packet
Lesson 38. Using Escape Characters To Enhance Program Output
Lesson 39. Dictionaries
Lesson 40. Improving the Program Using a List of Dictionaries

Lesson 41. Refactoring & Housekeeping
Lesson 42. Python 3 Compatibility
Lesson 43. What is ARP Spoofing
Lesson 44. Redirecting the Flow of Packets in a Network Using arpspoof
Lesson 45. Creating an ARP Response
Lesson 46. Sending ARP Responses
Lesson 47. Extracting MAC Address From Responses
Lesson 48. Loops
Lesson 49. Using an Infinite Loop To Prominently Redirect Packets
Lesson 50. Dynamic Printing

Lesson 51. Handling Exceptions
Lesson 52. Implementing a Restore Function
Lesson 53. Restoring ARP Tables When an Exception Occures
Lesson 54. Introduction & Teaser
Lesson 55. Sniffing Packets Using Scapy
Lesson 56. Extracting data From a Specific Layer
Lesson 57. Analysing Sniffed Packets & Extracting Fields From Layers
Lesson 58. Analysing Fields & Extracting Passwords
Lesson 59. Extracting URLs
Lesson 60. Capturing Passwords From Any Computer Connected to the Same Network

Lesson 61. Intercepting Packets – Creating a Proxy
Lesson 62. Converting Packets to Scapy Packets
Lesson 63. What is DNS Spoofing
Lesson 64. Analysing DNS Responses
Lesson 65. Crafting a Custom DNS Response
Lesson 66. Modifying Packets On The Fly
Lesson 67. Redirecting DNS Responses
Lesson 68. Introduction & Teaser
Lesson 69. Filtering Traffic Based on the Port Used

Lesson 70. Analysing HTTP Requests
Lesson 71. Modifying HTTP Requests on the Fly
Lesson 72. Replacing HTTP Requests
Lesson 73. Intercepting & Replacing Downloads on The Network
Lesson 74. Introduction & Teaser
Lesson 75. Analysing HTTP Responses
Lesson 76. Replacing a Substring Using Regex
Lesson 77. Decoding HTTP Responses
Lesson 78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
Lesson 79. Refactoring & Housekeeping
Lesson 80. Debugging Issues

Lesson 81. Using Groups & None-capturing Regex
Lesson 82. Recalculating Content Length
Lesson 83. BeEF Overview & Basic Hook Method
Lesson 84. Hooking Computers Using code_injector
Lesson 85. Basic BeEF Commands
Lesson 86. Delivering Malware Using BeEF
Lesson 87. How to Bypass HTTPS
Lesson 88. Bypassing HTTPS & Sniffing Login Credentials
Lesson 89. Replacing Downloads on HTTPS Pages
Lesson 90. Injecting Code in HTTPS Pages

Lesson 91. Running Python Programs on Windows
Lesson 92. Capturing & Analysing ARP Responses
Lesson 93. Detecting ARP Spoofing Attacks
Lesson 94. Introduction & Teaser
Lesson 95. Execute System Command Payload
Lesson 96. Sending Reports By Email
Lesson 97. Filtering Command Output Using Regex
Lesson 98. Stealing WiFi Passwords Saved on a Computer
Lesson 99. Downloading Files From Program
Lesson 100. Writing Files on Disk

Lesson 101. Password Recovery Basics
Lesson 102. Using all the Above to Steal Saved Passwords Remotely
Lesson 103. Interacting With The File System
Lesson 104. Introduction & Teaser
Lesson 105. Writing a Basic Local Keylogger
Lesson 106. Global Variables
Lesson 107. Logging Special Keys
Lesson 108. Threading & Recursion
Lesson 109. OOP – Object Oriented Programming Basics
Lesson 110. Constructor Methods & Instance Variables

Lesson 111. Logging Key-strikes and Reporting Them By Email
Lesson 112. Introduction & Teaser
Lesson 113. Client – Server Communication & Connection Types
Lesson 114. Connecting Two Remote Computers Using Sockets
Lesson 115. Sending & Receiving Data Over TCP
Lesson 116. Executing System Commands Remotely
Lesson 117. Implementing a Server
Lesson 118. Implementing Skeleton For Server – Client Communication
Lesson 119. Refactoring – Creating a Listener Class
Lesson 120. Refactoring – Creating a Backdoor Class

Lesson 121. Serialisation – Theory
Lesson 122. Serialisation – Implementing Reliable Methods to Send & Receive Data Over TCP
Lesson 123. Serialisation – Reliably Sending & Receiving Data
Lesson 124. Sending Commands as List & Implementing Exit Command
Lesson 125. Interacting With the File System – Implementing cd Command
Lesson 126. Reading Files
Lesson 127. Writing Files
Lesson 128. Downloading Files From Hacked Computer
Lesson 129. Implementing Upload Functionality in Listener
Lesson 130. Implementing Upload Functionality in Backdoor

Lesson 131. Handling Unknown Exceptions
Lesson 132. Using the Backdoor to Hack Windows, Linux & OS X
Lesson 133. Introduction & Teaser
Lesson 134. Converting Python Programs To Windows Binary Executables
Lesson 135. Running Executables Silentely
Lesson 136. Installing Windows Pyinstaller on Linux
Lesson 137. Packaging Programs For Windows From Linux
Lesson 138. Persistence Idea
Lesson 139. Running Programs on Startup
Lesson 140. Creating a Basic Trojan Using Download & Execute Payload

Lesson 141. Creating a Trojan By Embedding Files In Program Code
Lesson 142. Bypassing Anti-Virus Programs – Theory
Lesson 143. Bypassing Anti-Virus Programs – Practical
Lesson 144. Adding an Icons to Generated Executables
Lesson 145. Spoofing File Extension
Lesson 146. Converting Python Programs To OS X Executables
Lesson 147. Converting Python Programs to Linux Executables
Lesson 148. Introduction & Teaser
Lesson 149. What is a Website
Lesson 150. How to Hack a Website

Lesson 151. Sending GET Requests To Web Servers
Lesson 152. Discovering Subdomains
Lesson 153. Discovering Hidden Paths in Websites
Lesson 154. Reading Response Content
Lesson 155. Extracting Useful Data From Response
Lesson 156. Filtering Rsults
Lesson 157. Extracting Unique Links & Storing Them In a List
Lesson 158. Recursively Discovering All Paths On a Target Website
Lesson 159. Sending Post Requests to Websites
Lesson 160. Guessing Login Information on Login Pages

Lesson 161. Introduction & Teaser
Lesson 162. HTTP Requests – POST VS GET
Lesson 163. Parsing HTML Code
Lesson 164. Extracting HTML Attributes
Lesson 165. Posting Forms
Lesson 166. Building Basic Structure For Vulnerability Scanner
Lesson 167. Using Default Parameters
Lesson 168. Sending Requests in a Session
Lesson 169. Extracting & Submitting Forms Automatically
Lesson 170. Implementing a Method To Run The Scanner

Lesson 171. Discovering XSS Vulnerabilities
Lesson 172. Exploiting XSS Vulnerabilities
Lesson 173. Implementing Code To Discover XSS in Forms
Lesson 174. Implementing Code To Discover XSS in Parameters
Lesson 175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner

Comments