Tags
Language
Tags
October 2025
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Learn Ethical Hacking With Python And Kali From Scratch

    Posted By: ELK1nG
    Learn Ethical Hacking With Python And Kali From Scratch

    Learn Ethical Hacking With Python And Kali From Scratch
    Published 10/2023
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 8.19 GB | Duration: 8h 24m

    Learn how to become an Ethical Hacker using Python and Kali Linux to perform penetration testing on networks.

    What you'll learn

    Installation of Virtual Box & Kali Linux.

    Learn ethical hacking and cyber security, python programming and kali linux scripting at the same time

    Install hacking lab on Windows 10 operating system

    Know what is hacking and cyber security

    Install windows 11 on virtualBox

    Install virtualBox on windows

    Install kali Linux on virtualBox

    Use kali Linux terminal

    Understand different network layers such as ARP, HTTP

    Use Wireshark to see how TCP protocol uses a three-way handshake to establish a network connection, such as http protocol

    Use Wireshark to see how UDP protocol is used in a network such as DHCP protocol

    Use Wireshark to see how ICMP protocol is used for testing connectivity, such as ping tool

    Use Wireshark to see how ARP protocol is used in internal networks to map IPv4 addresses to MAC addresses

    Learn the difference between IPv4 and IPv6 ,private and public IP addresses, Subnets and CIDR, port numbers.

    Learn how to use NetDiscover to scan a network ,using active or passive scanning, and how to scan multiple networks

    Use Nmap tool to scan a port or a range of ports

    Use Nmap for TCP port scan ,without fully connecting to the target device

    Use Nmap for UDP port scan, and how to use timing options

    Use Zenmap which is a GUI version of Nmap

    Downgrade HTTPS to HTTP

    Intercept and modify network packets

    Create a Hidden Bind TCP payload using Msfvenom

    Create a reverse TCP payload using Msfvenom

    Creating backdoors using TheFatRat

    Hide payloads behind images

    Hack a Web Browsers using BeEF

    Evade Antivirus with Veil-Evasion

    ARP poisoning with Arpspoof

    Installing Metasploitable 2 in VirtualBox

    Using Hydra password cracking tool

    Know how to launch JavaScript Injection attack

    Exploit port 21 FTP Server

    Hack and Exploit port 22 SSH Metasploitable 2

    Hack and Exploit Port 23 Telnet Metasploitable 2

    Hack and Exploit Ports 512-513-514 netkit-rsh Metasploitable 2

    Hack and Exploit SAMBA Metasploitable 2

    Learn how to Connect to WiFi wireless network

    Install Wireless adapter

    Create Ad Hoc WiFi

    Learn how to attack a computer using Denial of Service Attack using MKD3

    Use Fern WiFi Cracker to crack a password

    Hack wireless network using Airgeddon

    Uncover hidden SSID

    Create password wordlist using crunch and save the output in a file

    Use aircrack-ng to test the keys in the worldlist

    Use filter in wireshark

    Use aireplay to launch deauthentication attack

    Run dictionary attacks to guess username and password

    Use airodump to sniff and capture packets and to see all wireless in the area

    Analyze the wireless networks

    Learn the basics of assembly language

    Know what are the reserved words and identifiers such as MOV , SUB,NOP in assembly language

    Know what are Boolean and comparison instruction such as AND,XOR,CMP in assembly language

    Learn how to convert Pseudocode to assembly language

    Know what are Mnemonic, operands and labels in assembly language

    Know how to declare a variable if it is byte, word or double word or signed variable in assembly language

    Know how to use jump based on sign or flag and loop, and the difference between local and global labels

    Use while loop in assembly language

    Know what are Little Endian and big-Endian order in assembly

    Know when overflow occurs

    Know how Stack operations work ,and how to use procedures

    Use PUSH, POP and LEA instructions in assembly language

    Know how to CALL a PROCEDURE in assembly language

    Know types of registers and what are they used for in assembly language

    Install Immunity Debugger on Windows 10 machine

    Use Immunity Debugger

    Install Visual Studio Code and Mingw 64 on Windows 10

    Stack Overflow Exploitation using VulnServer

    SyncBreeze 10.0.28 Buffer Overflow attack

    Install VulnServer on Windows 10

    Write a python program to test the crash of a target machine using TRUN

    Use sockets to send data over TCP

    Use pattern creation to launch an attack

    Use python scripting to find offset location of EIP register in the target machine

    Use python scripting to control EIP register in the Vulnserver target machine

    Use python scripting to send payload to Vulnserver target machine

    Install SyncBreeze 10.0.28 on windows 10 machine

    Instal python 2.7 on windows 10 machine

    Install mona on Windows 10 machine

    Hack a remote machine by manipulating a username using a long string to crash the application and lead to memory corruption

    Use python scripting to build a fuzzer

    Use python scripting to test the connectivity with the server

    Use python scripting to send multiple HTTP post requests with long usernames

    Use python scripting to generate all possible hexadecimal numbers from 00 to FF

    Use python scripting to find bad characters

    Use python scripting to create a shell code payload without bad characters

    Use Mona to search for the hexadecimal of an opcode in dll file

    Requirements

    Computer device with a minimum of 4GB memory, and Windows, OS X or Linux operating System.

    Wireless adapter with packet sniffing capabilities (for the wireless attacks section)

    No hacking knowledge required.

    Description

    Ethical hacking is used to ensure that any network is secure. This course will provide information about different software and tools that you can use when you are performing an ethical hack. There are some sample programs in the course that you can use to begin the ethical hacking process.This course has different tools that you can use to test the network for any vulnerabilities. Once you identify the vulnerabilities, you can work towards improving network security. If you do not know how a hacker thinks, you may not be able to test the system well. This course for you ,if you want to learn more about how to test the vulnerabilities in a system or network and want to fix those vulnerabilities.This course will cover the following topics:Setting up a penetration test environment to practice hacking safely:Installing VirtualBox on Windows 10.Installing Kali Linux on VirtualBox.Installing Windows 11 on VirtualBox.Installing Visual Studio Code on Kali Linux.Installing Metasploitable 2 in VirtualBox.Installing Immunity Debugger on Windows 10.Installing Visual Studio Code and Mingw 64 on Windows 10.Installing mona on Windows 10.Connecting to WiFi wireless network.Installing Wireless adapter.Hacking topics:Network basics, all you need to know about ARP protocol, TCP protocol, UDP protocol, ICMP protocol and IP addressing.Information gathering using different tools such as Netdiscover, Nmap and Zenmap.Man in the middle attacks which includes ARP poisoning using BetterCAP and EtterCAP, DNS spoofing attacks using BetterCAP and EtterCAP.Client side attacks, such as creating a reverse TCP or a hidden bind TCP using Msfvenom, hide payloads behind images, ARP poisoning with Arpspoof, creating backdoors using TheFatRat, Evading Web browsers using BeEF .Server side attacks, such as Hack and exploit ports 21 FTP, 22 SSH , 23 Telnet Metasploitable 2,Hack and exploit ports 512,513,514 netkit-rsh Metasploitable 2,Hack SAMBA Metasploitable 2,Using Hydra password cracking tool.Exploit the stack using the buffer overflow, Stack overflow exploitation using VulnServer, and SyncBreeze 10 0 28 Buffer Overflow attack.Wireless attacks, such as hacking passwords using Dictionary Attack and Brute Force Attack, uncover hidden SSID, Hack wireless network using Airgeddon, luanch Denial of service attack using MKD3,Hacking passwords using Fern WiFi Cracker, creating Ad Hoc WiFi.Programming topics:Assembly languagewhere you will learn Types of registers.Data transfer instructions.Little Endian and big Endian order.Defining data.Boolean and comparison instructions.Conditional structure.Jump and loop instructions.Stack operations and using procedures .And overflow.Python programmingImplement the following hacking programs using python scripting:Find offset location of EIP register in the target machine.Control EIP register in the Vulnserver target machine.Send payload to vulnserver target machine.Build a fuzzer.Test the connectivity with the server.Send multiple HTTP post requests with long usernames.Generate all possible hexadecimal numbers from 00 to FF.Find bad characters.Create a shell code payload without bad characters.Notes:Please note the information contained in this course is for educational purposes only

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Installing VirtualBox on Windows 10

    Lecture 3 Installing kali on VirtualBox

    Lecture 4 A tour of kali

    Lecture 5 Installing Windows 11 on VirtualBox

    Lecture 6 Installing Visual Studio Code on Kali

    Section 2: Basics of Networking

    Lecture 7 ARP protocol

    Lecture 8 TCP protocol

    Lecture 9 UDP protocol

    Lecture 10 ICMP protocol

    Lecture 11 IP addressing

    Section 3: Information Gathering

    Lecture 12 Network scanning using Netdiscover

    Lecture 13 Port scanning with Nmap

    Lecture 14 TCP SYN scan using Nmap

    Lecture 15 UDP scan using Nmap

    Lecture 16 Port scanning with Zenmap

    Section 4: Man in the middle attacks

    Lecture 17 ARP poisoning with EtterCAP

    Lecture 18 ARP Poisoning with BetterCAP attack

    Lecture 19 DNS spoofing attack using BetterCAP

    Lecture 20 DNS spoofing attack using EtterCAP

    Section 5: Client side attacks

    Lecture 21 Create a reverse TCP payload using Msfvenom

    Lecture 22 Create a Hidden Bind TCP payload using Msfvenom

    Lecture 23 Hide payloads behind images

    Lecture 24 ARP poisoning with Arpspoof

    Lecture 25 Creating backdoors using TheFatRat

    Lecture 26 Evading Antivirus with Veil-Evasion

    Lecture 27 Hacking Web Browsers using BeEF

    Section 6: Server side attacks

    Lecture 28 Installing Metasploitable 2 in VirtualBox

    Lecture 29 Exploit port 21 FTP Server

    Lecture 30 Hack and Exploit port 22 SSH Metasploitable 2

    Lecture 31 Hack and Exploit Port 23 Telnet Metasploitable 2

    Lecture 32 Hack and Exploit Ports 512-513-514 netkit-rsh Metasploitable 2

    Lecture 33 Hack and Exploit SAMBA Metasploitable 2

    Lecture 34 Using Hydra password cracking tool

    Section 7: Assembly Language and Reverse Engineering

    Lecture 35 Types of Registers

    Lecture 36 Basic elements

    Lecture 37 Defining data

    Lecture 38 Little Endian and big-Endian order

    Lecture 39 Data transfer instructions

    Lecture 40 Boolean and comparison instructions

    Lecture 41 JMP and LOOP

    Lecture 42 Conditional structure

    Lecture 43 Overflow

    Lecture 44 Stack operations and using procedures

    Section 8: Exploit the stack using the buffer overflow

    Lecture 45 Installing Visual Studio Code and Mingw 64 on Windows 10

    Lecture 46 Installing Immunity Debugger

    Lecture 47 Immunity Debugger overview

    Lecture 48 Stack Overflow Exploitation using VulnServer

    Lecture 49 SyncBreeze 10.0.28 Buffer Overflow attack

    Section 9: Wireless Attacks

    Lecture 50 Connecting to WiFi wireless network

    Lecture 51 Installing Wireless adapter

    Lecture 52 Fern WiFi Cracker

    Lecture 53 Hacking passwords using Dictionary Attack and Brute Force Attack

    Lecture 54 Hack wireless network using Airgeddon

    Lecture 55 Denial of Service Attack using MKD3

    Lecture 56 Uncover hidden SSID

    Lecture 57 Ad Hoc WiFi

    Anyone who wishes to become an Ethical Hacker or Penetration Tester in the field of Information Security.,Anyone who wishes to learn python programming,Anyone who wishes to learn Linux scripting