
Become Ethical Hacker by building your own payloads with Python and JavaScript. (Real World Attacks Included)
Learn to use Kali Linux – a penetration testing operating system
Learn linux basics
Learn to crack WPA networks
Learn to remain anonymous while hacking
Learn to hack secure systems using client-side and social engineering attacks
Learn to launch various Man in the Middle Framework (MITMF) plugins
Learn to use Wireshark
Learn to use veil framework to make payloads and get access to victim machine file system
Learn about information gathering tools like nmap and netdiscover
Discover open ports, installed services and vulnerabilities on computer systems
Network basics & how devices interact inside a network
Learn about BEEF framework
Learn to make custom malware and backdoors with Python
Learn to make port scanner with Python
Learn to make macchanger with Python
Learn to pen-test web applications with Javascript with BurpSuite
Learn about Socket Programming with Python
Learn to gain control over computer systems using client side attacks
Learn to create complete web crawler with Python: Application that crawls all subdomains and links
Learn to customize payloads to bypass most antiviruses
Learn to discover vunerabilties like XSS, HTMLI, URI redirection, XEE and Host Header Injection in live and test website
Learn to make Keylogger with Python, JavaScript and Kali tools
Learn to gather sensitive information about websites
Use social engineering to gain full control over target systems
Learn to create some networking applications with Python like nmap scanner and macchanger
Welcome to this most comprehensive course on Ethical Hacking. Hacking is not always a rewarding activity but it is one of the most fun profession where you can use your knowledge to make yours and others system secured. This course will try to turn you into a person who can check for the vulnerability in the system and make your own payload to pen-test that system and evaluate proper security measures that needs to be adopted. We’ll try to make payloads and test systems from section one, Thus this course is highly practical. We (Bit4Stack Tech Inc.) assumes that you have no prior knowledge in these topics, So we will provide some theory related to networking at the beginning and hands on examples with it.
We will cover three modules in this course. Every module will have rich contents related to Hacking. First module covers about Kali Linux and its Hacking Applications. We will go through most of the applications that are available in Kali Linux like airodump-ng, mitmf, wireshark, veil framework, beef framework and lots more. Second module covers Python programming and pen testing machines with it. First of all we will learn about basics of python and we will make applications like mac changer, port scanner and crawler with python. We will have dedicated section to write malware and backdoor with python. Third module covers about JavaScript and its use in web pen-testing. We will make our own payload to find vulnerability in test and live websites. Attacks like XSS, URL redirection, HTML Injection and Host Header Injection.
Highlights of Course:
- Kali Linux:
- Linux Commands
- Basic File System commands
- Upgrade packaging commands
- permission commands
- Installing Victim and Hacker Machine in Virtual Box
- Installing test windows 10 on Virtual Box
- Information Gathering
- Using netdiscover and nmap to uncover IP addresses and mac addresses
- WPA/WPS attacks
- Using airodump-ng to sniff packets
- Using Handshake protocols
- Using aireplay-ng to deauth clients
- Man In the Middle Framework
- ARP Spoofing
- Plugins to take screenshot and inject js-url and jskeylogger
- WireShark
- Analyzing packets flow
- Veil Framework
- Creating undetectable backdoor
- Create reverse shell
- Beef Framework
- Browser Exploitation
- Running multiple Hook commands
- Linux Commands
- Python:
- Python Crash Course
- Variable and Statements
- Values and types
- Flow controls
- Functions
- Object Oriented Programming
- Regular Expression
- Threading and many more..
- Port Scanner and Nmap
- Scan for IP, mac addresses and Open Port of machine
- UDP, TCP and Comprehensive scan
- Mac changer
- Using subprocess
- Writing a Keylogger
- pynput keylogger
- pyperclip keylogger
- Writing a Malware and Backdoor
- Undetectable backdoor and malware
- Captures screenshot, Locks PC, Opens Web browser, Hijacks Saved Passwords
- Hack cmd of window client
- Writing a web Crawler
- Write crawler to find subdomains and links
- Using BeautifulSoup
- Python Crash Course
- JavaScript:
- Introduction to BurpSuite
- Burpsuite: Repeater, Audit and Crawl, Intruder
- Cross Site Scripting Attacks
- Make custom payloads
- Hijack Events
- run multiple payloads to test for XSS in live websites
- URL Redirection
- URL Path Fragment
- URL path redirection
- HTML injection
- Host Header Injection
- XML External Entity attack
- Introduction to BurpSuite
- Anonymous:
- TOR network
- Host .onion website
- VPN
- Proxy Chains
- Mac Changer
- and many more!
- TOR network
Misc topics:
- Basics of network hacking / penetration testing.
- Changing MAC address & bypassing filtering.
- Network mapping.
- ARP Spoofing – redirect the flow of packets in a network.
- Spying on any client connected to the network – see usernames, passwords, visited urls ….etc.
- Inject code in pages loaded by any computer connected to the same network.
- Replace files on the fly as they get downloaded by any computer on the same network.
Python/JavaScript:
- Create malware for Windows, OS X and Linux.
- Hack Windows, OS X and Linux using custom backdoor.
- Bypass Anti-Virus programs.
- Use fake login prompt to steal credentials.
- Display fake updates.
- Use own keylogger to spy on everything typed on a Windows or OS X computer.
- Learn the basics of website hacking / penetration testing.
- Discover subdomains.
- Discover hidden files and directories in a website.
- Discover and exploit XSS vulnerabilities, XXE and HTMLI.
DISCLAIMER:
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, we highly condemn it. We cannot be held responsible for any misuse of the given information.
English
Language
Introduction
Introduction
Teaser 1: BEEF Framework
Teaser 2: Lock PC Using Backdoor
Hacking with Kali Linux
Installing Hacker & Victim Machine in Virtual Box
Linux Commands
apt-get command
chmod command
Networking Basics: Before Hacking
Information Gathering
Airmon-ng: Change Default mode of adapter to monitor mode
Change Managed Mode to Monitor Mode: Manual Method
Crack WPA: airodump-ng and crunch
Crack WPA with Wordlist
Man In The Middle Framework: ARP Spoof
ARP Spoofing and Capturing Packets with MITMF
MITMF Plugins
Inject Keylogger and take Screenshots with MITMF
Wireshark and MITMF Together to Hijack HTTP requests
Installing and configuring Veil Framework
Custom Payload with Veil
Making Backdoor: Reverse_HTTPS with Veil
Configuring Listener with msfconsole
Veil in action to get Connection from Client
Introduction to Beef Framework
Beef & MITMF in action to exploit Client Browser
Ethical Hacking Quiz
Hacking with Python
Start Python Crash Course: Command, Statement & Scripts
Keywords and types
Variables in Python
Formatting your text
Operators, Operands and Logic
Flow Controls: Conditionals
Flow Controls: Looping
User Defined and Lambda Functions
Scope and Packing, Unpacking Arguments
File Handling with Python
Data Structure: Lists
Strings and inbuilt_methods
Data Structure: Dictionary
Data Structure: Tuples
Object Oriented Programming
Python Inheritance
List Comprehension
Making “MACChanger” with Python
Regular Expression
Intro to Mac Address Changer
Scripts for running commands in the Shell
Change MAC address
Random MAC Changer
Remain Anonymous While Hacking
TOR for Anonymous Browsing
Host Your Own Website with TOR
Remain Anonymous with Virtual Private Networks (VPN)
Prevent DNS Leaks with Proxychains
Nmap & Port Scanner with Python
Introduction to NMAP Scanner & nmap module
TCP, UDP and Comprehensive scan with nmap
Making PortScanner: Clone of NetDiscover tools of Kali
Using Scapy Module to implement ARP protocols
Formatting Responses to get IP and MAC addresses of Clients
Making KeyLogger with Python
Keylogger with Pynput Module
Keylogger using pyperclip module
Creating Malware with Python
Scripts for running commands on Clients
WIFI Password of Client with Delivery Method to Gmail
Downloading files Script
Beelogger: Modify your Keylogger
Making Advance Keylogger
Deliver Keylogger and Observe Keylogs
Implementation of Download file feature in Client
LaZagne: Capture Password with Our Malware
Packaging of Python File in Linux
Packaging technique to bypass Antiviruses
Convert Backdoor to Trojans
Creating Undetectable Backdoor with Python
Threading with Python
Backdoor and Socket Programming
Send and Recieve Data Between Server & Client
Start Advance Payloads making Listener: Kali Linux
Run Multiple Threads with threading module
List all connections
Client: Sandboxie, Mutex and VMs
Connect to Server and List Connections
Interact with connection
Send Message to Client From Backdoor
Open Web Browser of Windows Machine from Backdoor
Take Screenshots from Backdoor
Lock Client using Backdoor
Hijack Command Shell of Client: Server Side
Hijack Command Shell of Client: Client Side
Test Backdoor with Antiviruses
Web Crawler with Python
Getting response with requests module
Crawl all subdomains of main site
Discover Hidden URL of websites and Formatting
BeautifulSoup: Easy method to make Crawler
Hacking With JavaScript
Variables and its types: Local & Global
Comments in JS
Data Types
Conditionals
Looping
User-Defined Functions
let and const
JS Objects
JS Events
JS HTML DOM
JS Challenge: HACK THIS SITE mission 1-3
JS Challenge: HACK THIS SITE mission 4
JS Challenge: HACK THIS SITE mission 5-6
JS Obfuscation Challenge, Mission 7
JavaScript KeyLogger
Introduction to JS KeyLogger
Implement KeyStroke Listener with JS
PHP code write keylogs to File
BurpSuite: Web Application Penetrating Tool
Install BurpSuite and Configure Certificates
Configuration of BurpSuite
Tools of BurpSuite
Hunt for vulnerability with Burp in Live website
BurpSuite on Test Website
Cross-site scripting (XSS)
Introduction to XSS
Types of XSS with Examples
Learn to build XSS payloads
XSS-gameSpot for Payloads
XSS on test Website
Load Lines of Payload with Intruder
XSS hunting on Live Website 1
XSS hunting on Live Website 2
Phising with XSS attacks
Exploitation of XSS: URL Redirection
Advance Payload Part 1
Advance Payload Part 2
Attacks: HTML Injection, Host Header Injection
Introduction to HTML Injection
HTML Injection on Live Website
HTML Injection on Test Website
Post Exploitation: HTMLI
Introduction to Host Header Injection
Host Header Injection on Live Website
URL Redirection
Introduction to Open URL Redirection
URL Redirection through Path Payloads/Fragments
URL Redirection through Parameter
URL Redirection through Parameter with Example
XML External Entity (XXE)
Introduction to XEE
XXE on test Web App
The post Ethical Hacking With Python, JavaScript and Kali Linux first appeared on StudyBullet.
