Sumario: | Start from scratch and learn both topics simultaneously by writing 20+ hacking programs About This Video Write a remote keylogger that can register all keystrokes and send them by email Interact with files using Python (read, write, and modify them) Convert Python programs to binary executables that work on Windows, OS X, and Linux Convert evil files into Trojans that work and function just like any other file type such as an image or a PDF Write a program that can discover hidden paths in a website Send requests to websites and analyze responses Write a program that can map a website and discover all links, subdomains, files, and directories Run dictionary attacks and guess login information on login pages Write a program that can discover weaknesses in websites In Detail This course is highly practical but doesn't neglect the theory, so we start by covering some basics for ethical hacking and Python programming, installing the required software, and then starting to program straightaway. The course is divided into several sections, each of which aims to achieve a specific goal; the goal is usually to hack into a specific system, so we start by learning how this system works and its weaknesses. Then you'll learn how to write a Python program to exploit these weaknesses and hack the system; as we write the program, the author will teach you Python programming from scratch covering one topic at a time. Thus, by the end of the course, you will have written several ethical hacking programs by yourself (see below) via backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools; and the list goes on. You'll also have a deep understanding of how computer systems work, how to model problems, and how to design an algorithm to solve problems and implement the solution using Python. So, by the end of the course, you'll have the programming skills to write any program even if it has nothing to do with hacking, but you'll learn to program by programming hacking tools!
|