#Ethical Hacking With Python, JavaScript and Kali Linux


Become Ethical Hacker by building your own payloads with Python and JavaScript. (Real World Attacks Included)

What you will learn

☑ Learn to use Kali Linux – a penetration testing operating system

☑ Learn linux basics

☑ Learn to crack WPA networks

☑ Learn to remain anonymous while hacking

☑ Learn to hack secure systems using client-side and social engineering attacks

☑ Learn to launch various Man in the Middle Framework (MITMF) plugins

☑ Learn to use Wireshark

☑ Learn to use veil framework to make payloads and get access to victim machine file system

☑ Learn about information gathering tools like nmap and netdiscover

☑ Discover open ports, installed services and vulnerabilities on computer systems

☑ Network basics & how devices interact inside a network

☑ Learn about BEEF framework

☑ Learn to make custom malware and backdoors with Python

☑ Learn to make port scanner with Python

☑ Learn to make macchanger with Python

☑ Learn to pen-test web applications with Javascript with BurpSuite

☑ Learn about Socket Programming with Python

☑ Learn to gain control over computer systems using client side attacks

☑ Learn to create complete web crawler with Python: Application that crawls all subdomains and links

☑ Learn to customize payloads to bypass most antiviruses

☑ Learn to discover vunerabilties like XSS, HTMLI, URI redirection, XEE and Host Header Injection in live and test website

☑ Learn to make Keylogger with Python, JavaScript and Kali tools

☑ Learn to gather sensitive information about websites

☑ Use social engineering to gain full control over target systems

☑ Learn to create some networking applications with Python like nmap scanner and macchanger

Description

Welcome to this most comprehensive course on Ethical Hacking. Hacking is not always a rewarding activity but it is one of the most fun profession where you can use your knowledge to make yours and others system secured. This course will try to turn you into a person who can check for the vulnerability in the system and make your own payload to pen-test that system and evaluate proper security measures that needs to be adopted. We’ll try to make payloads and test systems from section one, Thus this course is highly practical. We (Bit4Stack Tech Inc.) assumes that you have no prior knowledge in these topics, So we will provide some theory related to networking at the beginning and hands on examples with it.

We will cover three modules in this course. Every module will have rich contents related to Hacking. First module covers about Kali Linux and its Hacking Applications. We will go through most of the applications that are available in Kali Linux like airodump-ng, mitmf, wireshark, veil framework, beef framework and lots more. Second module covers Python programming and pen testing machines with it. First of all we will learn about basics of python and we will make applications like mac changer, port scanner and crawler with python. We will have dedicated section to write malware and backdoor with python. Third module covers about JavaScript and its use in web pen-testing. We will make our own payload to find vulnerability in test and live websites. Attacks like XSS, URL redirection, HTML Injection and Host Header Injection.

Highlights of Course:

  1. Kali Linux:
    • Linux Commands
      1. Basic File System commands
      2. Upgrade packaging commands
      3. permission commands
    • Installing Victim and Hacker Machine in Virtual Box
      1. Installing test windows 10 on Virtual Box
    • Information Gathering
      1. Using netdiscover and nmap to uncover IP addresses and mac addresses
    • WPA/WPS attacks
      1. Using airodump-ng to sniff packets
      2. Using Handshake protocols
      3. Using aireplay-ng to deauth clients
    • Man In the Middle Framework
      1. ARP Spoofing
      2. Plugins to take screenshot and inject js-url and jskeylogger
    • WireShark
      1. Analyzing packets flow
    • Veil Framework
      1. Creating undetectable backdoor
      2. Create reverse shell
    • Beef Framework
      1. Browser Exploitation
      2. Running multiple Hook commands
  2. Python:
    • Python Crash Course
      1. Variable and Statements
      2. Values and types
      3. Flow controls
      4. Functions
      5. Object Oriented Programming
      6. Regular Expression
      7. Threading and many more..
    • Port Scanner and Nmap
      1. Scan for IP, mac addresses and Open Port of machine
      2. UDP, TCP and Comprehensive scan
    • Mac changer
      1. Using subprocess
    • Writing a Keylogger
      1. pynput keylogger
      2. pyperclip keylogger
    • Writing a Malware and Backdoor
      1. Undetectable backdoor and malware
      2. Captures screenshot, Locks PC, Opens Web browser, Hijacks Saved Passwords
      3. Hack cmd of window client
    • Writing a web Crawler
      1. Write crawler to find subdomains and links
      2. Using BeautifulSoup
  3. JavaScript:
    • Introduction to BurpSuite
      1. Burpsuite: Repeater, Audit and Crawl, Intruder
    • Cross Site Scripting Attacks
      1. Make custom payloads
      2. Hijack Events
      3. run multiple payloads to test for XSS in live websites
    • URL Redirection
      1. URL Path Fragment
      2. URL path redirection
    • HTML injection
    • Host Header Injection
    • XML External Entity attack
  4. Anonymous:
    • TOR network
      1. Host .onion website
    • VPN
    • Proxy Chains
    • Mac Changer
    • and many more!

Misc topics:

  • Basics of network hacking / penetration testing.
  • Changing MAC address & bypassing filtering.
  • Network mapping.
  • ARP Spoofing – redirect the flow of packets in a network.
  • Spying on any client connected to the network – see usernames, passwords, visited urls ….etc.
  • Inject code in pages loaded by any computer connected to the same network.
  • Replace files on the fly as they get downloaded by any computer on the same network.

Python/JavaScript:

  • Create malware for Windows, OS X and Linux.
  • Hack Windows, OS X and Linux using custom backdoor.
  • Bypass Anti-Virus programs.
  • Use fake login prompt to steal credentials.
  • Display fake updates.
  • Use own keylogger to spy on everything typed on a Windows or OS X computer.
  • Learn the basics of website hacking / penetration testing.
  • Discover subdomains.
  • Discover hidden files and directories in a website.
  • Discover and exploit XSS vulnerabilities, XXE and HTMLI.

DISCLAIMER:

All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, we highly condemn it. We cannot be held responsible for any misuse of the given information.

English

Language

Content

Introduction

Introduction

Teaser 1: BEEF Framework

Teaser 2: Lock PC Using Backdoor

Hacking with Kali Linux

Installing Hacker & Victim Machine in Virtual Box

Linux Commands

apt-get command

chmod command

Networking Basics: Before Hacking

Information Gathering

Airmon-ng: Change Default mode of adapter to monitor mode

Change Managed Mode to Monitor Mode: Manual Method

Crack WPA: airodump-ng and crunch

Crack WPA with Wordlist

Man In The Middle Framework: ARP Spoof

ARP Spoofing and Capturing Packets with MITMF

MITMF Plugins

Inject Keylogger and take Screenshots with MITMF

Wireshark and MITMF Together to Hijack HTTP requests

Installing and configuring Veil Framework

Custom Payload with Veil

Making Backdoor: Reverse_HTTPS with Veil

Configuring Listener with msfconsole

Veil in action to get Connection from Client

Introduction to Beef Framework

Beef & MITMF in action to exploit Client Browser

Ethical Hacking Quiz

Hacking with Python

Start Python Crash Course: Command, Statement & Scripts

Keywords and types

Variables in Python

Formatting your text

Operators, Operands and Logic

Flow Controls: Conditionals

Flow Controls: Looping

User Defined and Lambda Functions

Scope and Packing, Unpacking Arguments

File Handling with Python

Data Structure: Lists

Strings and inbuilt_methods

Data Structure: Dictionary

Data Structure: Tuples

Object Oriented Programming

Python Inheritance

List Comprehension

Making “MACChanger” with Python

Regular Expression

Intro to Mac Address Changer

Scripts for running commands in the Shell

Change MAC address

Random MAC Changer

Remain Anonymous While Hacking

TOR for Anonymous Browsing

Host Your Own Website with TOR

Remain Anonymous with Virtual Private Networks (VPN)

Prevent DNS Leaks with Proxychains

Nmap & Port Scanner with Python

Introduction to NMAP Scanner & nmap module

TCP, UDP and Comprehensive scan with nmap

Making PortScanner: Clone of NetDiscover tools of Kali

Using Scapy Module to implement ARP protocols

Formatting Responses to get IP and MAC addresses of Clients

Making KeyLogger with Python

Keylogger with Pynput Module

Keylogger using pyperclip module

Creating Malware with Python

Scripts for running commands on Clients

WIFI Password of Client with Delivery Method to Gmail

Downloading files Script

Beelogger: Modify your Keylogger

Making Advance Keylogger

Deliver Keylogger and Observe Keylogs

Implementation of Download file feature in Client

LaZagne: Capture Password with Our Malware

Packaging of Python File in Linux

Packaging technique to bypass Antiviruses

Convert Backdoor to Trojans

Creating Undetectable Backdoor with Python

Threading with Python

Backdoor and Socket Programming

Send and Recieve Data Between Server & Client

Start Advance Payloads making Listener: Kali Linux

Run Multiple Threads with threading module

List all connections

Client: Sandboxie, Mutex and VMs

Connect to Server and List Connections

Interact with connection

Send Message to Client From Backdoor

Open Web Browser of Windows Machine from Backdoor

Take Screenshots from Backdoor

Lock Client using Backdoor

Hijack Command Shell of Client: Server Side

Hijack Command Shell of Client: Client Side

Test Backdoor with Antiviruses

Web Crawler with Python

Getting response with requests module

Crawl all subdomains of main site

Discover Hidden URL of websites and Formatting

BeautifulSoup: Easy method to make Crawler

Hacking With JavaScript

Variables and its types: Local & Global

Comments in JS

Data Types

Conditionals

Looping

User-Defined Functions

let and const

JS Objects

JS Events

JS HTML DOM

JS Challenge: HACK THIS SITE mission 1-3

JS Challenge: HACK THIS SITE mission 4

JS Challenge: HACK THIS SITE mission 5-6

JS Obfuscation Challenge, Mission 7

JavaScript KeyLogger

Introduction to JS KeyLogger

Implement KeyStroke Listener with JS

PHP code write keylogs to File

BurpSuite: Web Application Penetrating Tool

Install BurpSuite and Configure Certificates

Configuration of BurpSuite

Tools of BurpSuite

Hunt for vulnerability with Burp in Live website

BurpSuite on Test Website

Cross-site scripting (XSS)

Introduction to XSS

Types of XSS with Examples

Learn to build XSS payloads

XSS-gameSpot for Payloads

XSS on test Website

Load Lines of Payload with Intruder

XSS hunting on Live Website 1

XSS hunting on Live Website 2

Phising with XSS attacks

Exploitation of XSS: URL Redirection

Advance Payload Part 1

Advance Payload Part 2

Attacks: HTML Injection, Host Header Injection

Introduction to HTML Injection

HTML Injection on Live Website

HTML Injection on Test Website

Post Exploitation: HTMLI

Introduction to Host Header Injection

Host Header Injection on Live Website

URL Redirection

Introduction to Open URL Redirection

URL Redirection through Path Payloads/Fragments

URL Redirection through Parameter

URL Redirection through Parameter with Example

XML External Entity (XXE)

Introduction to XEE

XXE on test Web App


Enroll for Free


💠 Follow this Video to Get Free Courses on Every Udemy Topics! 💠

The post Ethical Hacking With Python, JavaScript and Kali Linux first appeared on StudyBullet.

LihatTutupKomentar