About
About Us
Help
Privacy Policy
Terms of Service
LearnDesk
Learn
Academics
Business
Creative
Health and Fitness
Lifestyle
Personal Development
Software
Topics
Admissions
Engineering
Hardware
Hospitality
Humanities
Chinese
Languages
Maths
Pharma
View All Topics
Topics
Accounting
Advertising
Analysis
Analytics
Business Communication
eCommerce
Entrepreneurship
Finance
Finance - India
Freelancing
View All Topics
Topics
Arts & Crafts
Audio Editing
Audio Production
Dance
Design
Film Production
Music
Photography
Video Production
Writing
View All Topics
Topics
Dieting
Fitness
Food Safety
Games
Medical
Medical Professionals
Meditation
Mental Health
Pregnancy
Safety & First Aid
View All Topics
Topics
Beauty & Makeup
Food
Fashion
Gaming
Home Improvement
Parenting
Pet Care & Training
Relationships
Sustainable Living
View All Topics
Topics
Career Development
Learning
Religion and Spirituality
Self-Improvement
View All Topics
Topics
Accounting
Amazon Web Services
App Development
Continuous Integration
Backup Software
Business Automation
Computational Fluid Dynamics
Business Intelligence
Computer Aided Design (CAD)
View All Topics
Teach
Teach Online
Schedule
Items
Billing
Users
Marketing
Analytics
Settings
Change School
Account
Log In
Sign Up
Python Ethical Hacking: Build Tools for Ethical Hacking
Introduction
What This Course Covers
Preview
Getting Started
Virtual Machines
Preview
Operating Systems
Preview
Installing Python Part 1
Preview
Source Code
Installing Python Part 2
Integrated Development Environments [IDEs] to Use
Virtual Environment
Virtual Environment Linux
Virtual Environment Windows
Virtual Environment Windows Part 2
Visual Studio Code Configuration
Networking Introduction
Network Classification
Local Area Network Types
OSI Stack
Common Networking Terminologies
Introduction to Hacking
What is Hacking
Staying Anonymous
How to Change Mac Address
Creating Mac Changer Class
Regex Pattern
Completing Mac Function
Running the Program
Geo Tracking
How HTTP Protocol Works
How to Track IP Location
Packet Manipulation - Introduction to Scapy Module
Introduction to Networking Layers TCP/IP/ETHER
Scapy Introduction
Working with Scapy
Network Scanning
Network Mapper Introduction - NMAP
Creating Scapy Scanner
Scanning Network Using Scapy
Sending Packets
Creating Your Own Malware
Create a Server Program
Create a Client Program
Create Server Class
Listen and Accept Connections
Sending and Receiving Data
Create Client Class
Creating Instances for Server and Client
Handling the Connection
Getting User Input
Creating Command obj
Getting User Command
Execute System Command
Executing Command Windows
Handling Empty Command
Adding Delimeter
Receive Command Result Back
Malware - Upload Viruses and Files to Victim
Introduction How to Send File
Getting Files on Server
Send File
Receiving File Handler
Receiving File on Victim
Running the Program
Encrypting Viruses
Victim Client
Downloading Folder from Victim
Introduction How to Send Files to Hacker
Creating Handler
Sending List of Files to Hacker
Receiving List and Selecting Files to Send
Selecting File
Creating Zip
Creating Zip Part 2
Send Zipped Files to Hacker
Receiving Zipped Files
Running the Program
Hacker Server
Malware - File System Navigation
Navigation Handler
Sending Initial Current Directory to Hacker
Continued
Running the Program
Capturing Screenshot
Creating Handler
Capturing Screenshot
Run the Screenshot Program
Malware - Persistence
Persistence Handler
Copy Executable to App Data
Modifying Key Value
Creating Executable and Editing Registry
Testing the Program
Malware - Creating a Trojan
Installing Pyinstaller
Creating Executable with No Console
Adding Icon to Executable
Creating Trojan Using Winrar
Attack Over Public IP
WIFI - Steal Passwords
Stealing Wifi Passwords
Stealing Wifi Passwords Continued
Getting Access Point Names
Testing the Program
Man in the Middle Attack - MITM with ARP
Introduction to Address Resolution Protocol
ARP Spoofing
Installing ARP Spoof Linux
Enable IP Forwarding
MITM Attack Over ARP
Capturing Packets
ARP Spoof Victim
ARP Spoof with Function
ARP Spoofing Loop
Restoring ARP Tables
Performing Man in the Middle Attack
Testing the Program
Adding Command Line Arguments
Decrypting Packets Using SSL Strip
Introduction to SSL Strip
Installing SSL Strip Linux
Removing Encryption
Archieve Cracker - Cracking Passwords Using Dictionary Attack
Introduction to Password Cracking
Parsing Options
Reading Password File
Creating Extract Zip Method
Testing the Program
Creating Executable
Archieve Cracker
Zip Cracker
Keylogger - Spying Tool
Introduction to Keyloggers
Writing Keystrokes to a File
Removing Quotes
Modifying Program to Add Space Key
Adding Backspace Functionality
Botnet - Command and Control - Control Multiple Clients
Introduction to Botnets
Creating Bots
CnC and Bots
Testing the Program
Cryptography
Introduction to Cryptography
String Encryption
Encrypt File
Decrypt File
Protection
Protecting Yourself from Hackers
.gitattributes
Malware - File System Navigation
Python Ethical Hacking: Build Tools for Ethical Hacking
By:
Admin
Share
Share the link to this page
Copied
Facebook
Twitter
WhatsApp
LinkedIn
Email
Add to Calendar
Add the class to your calendar
Add to Google Calendar
Add to Apple Calendar
Add to Yahoo Calendar
Add to Outlook Calendar
Print
Completed
We'll cover the following topics in this section:
Navigation Handler
Sending Initial Current Directory to Hacker
Continued
Running the Program
Previous
Next
Sign Up
Signup to access thousands of classes
Continue with Facebook
Continue with Google
OR
Continue with Email
Already a member?
Log In
By registering for a LearnDesk account, you agree to our
Terms of Service
and
Privacy Policy
.
Share
Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.
Share with Google Contacts