Network Penetration Testing By Using Python
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.29 GB | Duration: 7h 0m
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.29 GB | Duration: 7h 0m
Employ the power of Python programming to create programs for network penetration testing.
What you'll learn
Students will learn the use of Python programming in Network Penetration testing.
They will learn the implementation of network attacks such as scanning, sniffing, DHCP server attack, and Wireless attack
They can enhance their knowledge of network security by creating their tools. Students can launch different attacks to check the vulnerability of network system
Students can make software to detect the different types of network attacks.
Students can do new research by applying by creating their own tools and detection mechanism.
Requirements
Basic of Python, Networking and Linux
Description
The student will learn about the network hacking or penetration testing concept without any tools in this Course. The Course is divided into 6 Sections or chapters. In the first chapter, you will learn about socket programming and its concept. You will also learn about Wireshark and its filters. In the second chapter, you will learn the scanning process. The chapter includes coding IP scanners (ping sweep), threaded IP scanners, port scanners, and threaded port scanners. The Third chapter teaches you about the sniffing process. You will learn how to create the sniffers of Ethernet, Network, and TCP layers. You will also learn about ARP protocol and how to perform ARP spoofing attacks. With the help of a sniffer, you can create your Intrusion detection system. The fourth chapter deals with the DHCP server concept and its attack. You will learn how to config a DHCP server and create a program to launch a DHCP starvation attack. In the Fifth chapter, you will learn about wireless frames. You will see how to capture important information such as SSID, BSSID, and channel number from the wireless Acess Point (AP). You will learn about scanning wireless frames, de-auth attacks, and finding the client connected to AP. In the Sixth chapter, students will learn about the honeypot creation. How to give fake ARP and ICMP (ping) replies. You will learn about unlisted DHCP attacks. You will know how to send a fake port open reply or a fake three-way handshake.
Overview
Section 1: Introduction to socket Programming and Wireshark
Lecture 1 Welcome and Course Overview
Lecture 2 Networking Commands
Lecture 3 What is socket, IP and Port number?
Lecture 4 Client and Server server communication using Python socket programming
Lecture 5 Useful socket Methods
Lecture 6 Wireshark: Installation and Filters
Section 2: Create IP scanner and Port scanner using RAW socket.
Lecture 7 Chapter 2 Introduction
Lecture 8 Simple IP scanner or Ping Sweep
Lecture 9 Multiple IPs scan
Lecture 10 Threaded IP scanner
Lecture 11 Simple Port scanner and TCP Three Way handshake
Lecture 12 Threaded Port scanner
Section 3: Creating Sniffers and ARP spoofing attack
Lecture 13 Introduction to chapter 3
Lecture 14 Sniffing Introduction
Lecture 15 Python Struct function
Lecture 16 Big Endian with Struct function
Lecture 17 Sniffing Ethernet frame
Lecture 18 Sniffing IP layer attribute
Lecture 19 TCP sniffing
Lecture 20 ARP concept
Lecture 21 ARP spoofing attack
Section 4: DHCP Server and its attack
Lecture 22 Chapter Introduction
Lecture 23 DHCP server Concept
Lecture 24 DHCP Server Installation in Ubuntu 16
Lecture 25 DHCP server starvation attack part 1 (discover packets attack)
Lecture 26 DHCP server starvation attack Part 2
Section 5: Wireless Frames and its attacks
Lecture 27 Chapter 5 Introduction
Lecture 28 What is Wireless Frames?
Lecture 29 Scanning Wireless Frames: Getting SSID, BSSID, Channel number using RAW socket
Lecture 30 Scanning Wireless Frames : Getting SSID and BSSID using scapy library.
Lecture 31 Dot11 and getting Channel number of Access Point using Scapy
Lecture 32 Finding connected Clients of any Wireless Access Point
Lecture 33 Wireless MAC Deauth Attack
Section 6: HoneyPot By using Python
Lecture 34 Introduction to Section
Lecture 35 MAC Layer : Fake ARP reply concept
Lecture 36 MAC Layer: Fake ARP reply coding and testing
Lecture 37 Network Layer : Fake ICMP reply or Fake ping response: Part1
Lecture 38 Network Layer: Sending Fake ICMP reply by Python code with testing
Lecture 39 DHCP server new Attack (Unlisted)
Lecture 40 TCP layer: Fake TCP reply or fake port open or fake three way handshake packet
Networking guy who wants to be network hacker, or pen-tester