Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Ethical Hacking With Python, JavaScript and Kali Linux

Descriptions

Course Curriculum

Section 1: Introduction
Introduction 00:00:00
Teaser 1 BEEF Framework 00:00:00
Teaser 2 Lock PC Using Backdoor 00:00:00
Section 2: Hacking with Kali Linux
Installing Hacker & Victim Machine in Virtual Box 00:00:00
Linux Commands 00:00:00
Apt-Get command 00:00:00
Chmod command 00:00:00
Networking Basics Before Hacking 00:00:00
Information Gathering 00:00:00
Airmon-ng Change Default mode of adapter to monitor mode 00:00:00
Change Managed Mode to Monitor Mode Manual Method 00:00:00
Crack WPA airodump-ng and crunch 00:00:00
Crack WPA with Wordlist 00:00:00
Man In The Middle Framework ARP Spoof 00:00:00
ARP Spoofing and Capturing Packets with MITMF 00:00:00
MITMF Plugins 00:00:00
Inject Keylogger and take Screenshots with MITMF 00:00:00
Wireshark and MITMF Together to Hijack HTTP requests 00:00:00
Installing and configuring Veil Framework 00:00:00
Custom Payload with Veil 00:00:00
Making Backdoor Reverse HTTPS with Veil 00:00:00
Configuring Listener with msfconsole 00:00:00
Veil in action to get Connection from Client 00:00:00
Introduction to Beef Framework 00:00:00
Beef & MITMF in action to exploit Client Browser 00:00:00
Section 3: Hacking with Python
Start Python Crash Course Command, Statement & Scripts 00:00:00
Keywords and types 00:00:00
Variables in Python 00:00:00
Formatting your text 00:00:00
Operators, Operands and Logic 00:00:00
Flow Controls Conditionals 00:00:00
Flow Controls Looping 00:00:00
User Defined and Lambda Functions 00:00:00
Scope and Packing, Unpacking Arguments 00:00:00
File Handling with Python 00:00:00
Data Structure Lists 00:00:00
Strings and inbuilt methods 00:00:00
Data Structure Dictionary 00:00:00
Data Structure Tuples 00:00:00
Object Oriented Programming 00:00:00
Python Inheritance 00:00:00
List Comprehension 00:00:00
Section 4: Making MACChanger with Python
Regular Expression 00:00:00
Intro to Mac Address Changer 00:00:00
Scripts for running commands in the Shell 00:00:00
Change MAC address 00:00:00
Random MAC Changer 00:00:00
Section 5: Remain Anonymous While Hacking
TOR for Anonymous Browsing 00:00:00
Host Your Own Website with TOR 00:00:00
Remain Anonymous with Virtual Private Networks (VPN) 00:00:00
Prevent DNS Leaks with Proxychains 00:00:00
Section 6: Nmap & Port Scanner with Python
Introduction to NMAP Scanner & nmap module 00:00:00
TCP, UDP and Comprehensive scan with nmap 00:00:00
Making Port Scanner Clone of NetDiscover tools of Kali 00:00:00
Using Scapy Module to implement ARP protocols 00:00:00
Formatting Responses to get IP and MAC addresses of Clients 00:00:00
Section 7: Making KeyLogger with Python
Keylogger with Pynput Module 00:00:00
Keylogger using pyperclip module 00:00:00
Section 8: Creating Malware with Python
Scripts for running commands on Clients 00:00:00
WIFI Password of Client with Delivery Method to Gmail 00:00:00
Downloading files Script 00:00:00
Beelogger Modify your Keylogger 00:00:00
Making Advance Keylogger 00:00:00
Deliver Keylogger and Observe Keylogs 00:00:00
Implementation of Download file feature in Client 00:00:00
LaZagne Capture Password with Our Malware 00:00:00
Packaging of Python File in Linux 00:00:00
Packaging technique to bypass Antiviruses 00:00:00
Convert Backdoor to Trojans 00:00:00
Section 9: Creating Undetectable Backdoor with Python
Threading with Python 00:00:00
Backdoor and Socket Programming 00:00:00
Send and Recieve Data Between Server & Client 00:00:00
Start Advance Payloads making Listener Kali Linux 00:00:00
Run Multiple Threads with threading module 00:00:00
List all connections 00:00:00
Client Sandboxie, Mutex and VMs 00:00:00
Connect to Server and List Connections 00:00:00
Interact with connection 00:00:00
Send Message to Client From Backdoor 00:00:00
Open Web Browser of Windows Machine from Backdoor 00:00:00
Take Screenshots from Backdoor 00:00:00
Lock Client using Backdoor 00:00:00
Hijack Command Shell of Client Server Side 00:00:00
Hijack Command Shell of Client Client Side 00:00:00
Test Backdoor with Antiviruses 00:00:00
Section 10: Web Crawler with Python
Getting response with requests module 00:00:00
Crawl all subdomains of main site 00:00:00
Discover Hidden URL of websites and Formatting 00:00:00
BeautifulSoup Easy method to make Crawler 00:00:00
Section 11: Hacking With JavaScript
Variables and its types Local & Global 00:00:00
Comments in JS 00:00:00
Data Types 00:00:00
Conditionals 00:00:00
Looping 00:00:00
User-Defined Functions 00:00:00
Let and const 00:00:00
JS Objects 00:00:00
JS Events 00:00:00
JS HTML DOM 00:00:00
JS Challenge HACK THIS SITE mission 1-3 00:00:00
JS Challenge HACK THIS SITE mission 4 00:00:00
JS Challenge HACK THIS SITE mission 5-6 00:00:00
JS Obfuscation Challenge, Mission 7 00:00:00
Section 12: JavaScript KeyLogger
Introduction to JS KeyLogger 00:00:00
Implement KeyStroke Listener with JS 00:00:00
PHP code write keylogs to File 00:00:00
Section 13: BurpSuite Web Application Penetrating Tool
Install BurpSuite and Configure Certificates 00:00:00
Configuration of BurpSuite 00:00:00
Tools of BurpSuite 00:00:00
Hunt for vulnerability with Burp in Live website 00:00:00
BurpSuite on Test Website 00:00:00
Section 14: Cross-site scripting (XSS)
Introduction to XSS 00:00:00
Types of XSS with Examples 00:00:00
Learn to build XSS payloads 00:00:00
XSS-gameSpot for Payloads 00:00:00
XSS on test Website 00:00:00
Load Lines of Payload with Intruder 00:00:00
XSS hunting on Live Website 1 00:00:00
XSS hunting on Live Website 2 00:00:00
Phising with XSS attacks 00:00:00
Exploitation of XSS URL Redirection 00:00:00
Advance Payload Part 1 00:00:00
Advance Payload Part 2 00:00:00
Section 15: Attacks HTML Injection, Host Header Injection
Introduction to HTML Injection 00:00:00
HTML Injection on Live Website 00:00:00
HTML Injection on Test Website 00:00:00
Post Exploitation HTMLI 00:00:00
Introduction to Host Header Injection 00:00:00
Host Header Injection on Live Website 00:00:00
Section 16: URL Redirection
Introduction to Open URL Redirection 00:00:00
URL Redirection through Path Payloads Fragments 00:00:00
URL Redirection through Parameter 00:00:00
URL Redirection through Parameter with Example 00:00:00
Section 17: XML External Entity (XXE)
Introduction to XEE 00:00:00
XXE on test Web App 00:00:00
Online Learning Thailand.
X