Network Penetration Testing By Using Python

Posted By: ELK1nG

Network Penetration Testing By Using Python
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.29 GB | Duration: 7h 0m

Employ the power of Python programming to create programs for network penetration testing.

What you'll learn

Students will learn the use of Python programming in Network Penetration testing.

They will learn the implementation of network attacks such as scanning, sniffing, DHCP server attack, and Wireless attack

They can enhance their knowledge of network security by creating their tools. Students can launch different attacks to check the vulnerability of network system

Students can make software to detect the different types of network attacks.

Students can do new research by applying by creating their own tools and detection mechanism.

Requirements

Basic of Python, Networking and Linux

Description

The student will learn about the network hacking or penetration testing concept without any tools in this Course. The Course is divided into 6 Sections or chapters. In the first chapter, you will learn about socket programming and its concept. You will also learn about Wireshark and its filters. In the second chapter, you will learn the scanning process. The chapter includes coding IP scanners (ping sweep), threaded IP scanners, port scanners, and threaded port scanners. The Third chapter teaches you about the sniffing process. You will learn how to create the sniffers of Ethernet, Network, and TCP layers. You will also learn about ARP protocol and how to perform ARP spoofing attacks. With the help of a sniffer, you can create your Intrusion detection system. The fourth chapter deals with the DHCP server concept and its attack. You will learn how to config a DHCP server and create a program to launch a DHCP starvation attack. In the Fifth chapter, you will learn about wireless frames. You will see how to capture important information such as SSID, BSSID, and channel number from the wireless Acess Point (AP).  You will learn about scanning wireless frames, de-auth attacks, and finding the client connected to AP. In the Sixth chapter, students will learn about the honeypot creation. How to give fake ARP and ICMP (ping) replies. You will learn about unlisted DHCP attacks.  You will know how to send a fake port open reply or a fake three-way handshake.

Overview

Section 1: Introduction to socket Programming and Wireshark

Lecture 1 Welcome and Course Overview

Lecture 2 Networking Commands

Lecture 3 What is socket, IP and Port number?

Lecture 4 Client and Server server communication using Python socket programming

Lecture 5 Useful socket Methods

Lecture 6 Wireshark: Installation and Filters

Section 2: Create IP scanner and Port scanner using RAW socket.

Lecture 7 Chapter 2 Introduction

Lecture 8 Simple IP scanner or Ping Sweep

Lecture 9 Multiple IPs scan

Lecture 10 Threaded IP scanner

Lecture 11 Simple Port scanner and TCP Three Way handshake

Lecture 12 Threaded Port scanner

Section 3: Creating Sniffers and ARP spoofing attack

Lecture 13 Introduction to chapter 3

Lecture 14 Sniffing Introduction

Lecture 15 Python Struct function

Lecture 16 Big Endian with Struct function

Lecture 17 Sniffing Ethernet frame

Lecture 18 Sniffing IP layer attribute

Lecture 19 TCP sniffing

Lecture 20 ARP concept

Lecture 21 ARP spoofing attack

Section 4: DHCP Server and its attack

Lecture 22 Chapter Introduction

Lecture 23 DHCP server Concept

Lecture 24 DHCP Server Installation in Ubuntu 16

Lecture 25 DHCP server starvation attack part 1 (discover packets attack)

Lecture 26 DHCP server starvation attack Part 2

Section 5: Wireless Frames and its attacks

Lecture 27 Chapter 5 Introduction

Lecture 28 What is Wireless Frames?

Lecture 29 Scanning Wireless Frames: Getting SSID, BSSID, Channel number using RAW socket

Lecture 30 Scanning Wireless Frames : Getting SSID and BSSID using scapy library.

Lecture 31 Dot11 and getting Channel number of Access Point using Scapy

Lecture 32 Finding connected Clients of any Wireless Access Point

Lecture 33 Wireless MAC Deauth Attack

Section 6: HoneyPot By using Python

Lecture 34 Introduction to Section

Lecture 35 MAC Layer : Fake ARP reply concept

Lecture 36 MAC Layer: Fake ARP reply coding and testing

Lecture 37 Network Layer : Fake ICMP reply or Fake ping response: Part1

Lecture 38 Network Layer: Sending Fake ICMP reply by Python code with testing

Lecture 39 DHCP server new Attack (Unlisted)

Lecture 40 TCP layer: Fake TCP reply or fake port open or fake three way handshake packet

Networking guy who wants to be network hacker, or pen-tester