Ethical hacking with python and kali Linux from scratch
Learn how to become an Ethical Hacker using Python and Kali Linux to perform penetration testing on networks.

Ethical hacking with python and kali Linux from scratch free download
Learn how to become an Ethical Hacker using Python and Kali Linux to perform penetration testing on networks.
Ethical hacking is used to ensure that any network is secure. This course will provide information about different software and tools that you can use when you are performing an ethical hack. There are some sample programs in the course that you can use to begin the ethical hacking process.
This course has different tools that you can use to test the network for any vulnerabilities. Once you identify the vulnerabilities, you can work towards improving network security. If you do not know how a hacker thinks, you may not be able to test the system well.
This course for you ,if you want to learn more about how to test the vulnerabilities in a system or network and want to fix those vulnerabilities.
This course will cover the following topics:
Setting up a penetration test environment to practice hacking safely:
Installing VirtualBox on Windows 10.
Installing Kali Linux on VirtualBox.
Installing Windows 11 on VirtualBox.
Installing Visual Studio Code on Kali Linux.
Installing Metasploitable 2 in VirtualBox.
Installing Immunity Debugger on Windows 10.
Installing Visual Studio Code and Mingw 64 on Windows 10.
Installing mona on Windows 10.
Connecting to WiFi wireless network.
Installing Wireless adapter.
Introduction to Linux:
The Linux file system.
Basic commands such as ls, pwd, cat, cd.
Creating and editing files and directories using the command mkdir, touch, vi, nano.
Copying, moving and renaming files and directories using the commands cp, mv.
Searching for text using the commands locate, whereis, which, find, grep.
Installing and upgrading packages using the commands apt, dpkg.
Processes and job management using the commands ps, ps aux, nice, renice, kill.
Basic commands to check hardware using the commands lspci, lsusb, lshw.
Running commands sequentially using semi-colon and &&.
Passing output.
File permissions using chmod to change permission to read, write and execute.
Using the commands cut, awk, tr and sed.
Shell programming.
If statement.
For loop.
While loop.
Functions.
Hacking topics:
Network basics, all you need to know about ARP protocol, TCP protocol, UDP protocol, ICMP protocol and IP addressing.
Information gathering using different tools such as Netdiscover, Nmap and Zenmap.
Man in the middle attacks which includes ARP poisoning using BetterCAP and EtterCAP, DNS spoofing attacks using BetterCAP and EtterCAP.
Client side attacks, such as creating a reverse TCP or a hidden bind TCP using Msfvenom, hide payloads behind images, ARP poisoning with Arpspoof, creating backdoors using TheFatRat, Evading Web browsers using BeEF .
Server side attacks, such as Hack and exploit ports 21 FTP, 22 SSH , 23 Telnet Metasploitable 2,Hack and exploit ports 512,513,514 netkit-rsh Metasploitable 2,Hack SAMBA Metasploitable 2,Using Hydra password cracking tool.
Website hacking: setup a Burp Suite Proxy, Cross Site Scripting attack.
Exploit the stack using the buffer overflow, Stack overflow exploitation using VulnServer, and SyncBreeze 10 0 28 Buffer Overflow attack.
Wireless attacks, such as hacking passwords using Dictionary Attack and Brute Force Attack, uncover hidden SSID, Hack wireless network using Airgeddon, luanch Denial of service attack using MKD3,Hacking passwords using Fern WiFi Cracker, creating Ad Hoc WiFi.
Programming topics:
Python programming
Python fundamentals
In this section you will learn the basics of Python programming including the following:
Python basics
Input ,output
Variables
Python data structures including the following:
Strings
String functions
Lists and tuples
Dictionary
Also you will learn:
How to perform calculations in Python
The if statement
The while loop
The for loop
Python functions including the def keyword, using the pass statement, return statement, global and local variables.
File handling
In this section you will learn
Managing files in Python
Using loops to process files
Python Exception handling
Python Object Oriented Programming OOP.
in this section we will cover the concepts that help you to reuse code by building modular.
Classes in Python
Inheritance
Polymorphism
Learn how to create and import a python modules
Learn how to write Python automation scripts using Pyautogui package
Image detection Using Python
Socket programming in Python which is used to connect two nodes on a network to communicate with each other.
Also we will Implement the following hacking programs using python scripting:
Find offset location of EIP register in the target machine.
Control EIP register in the Vulnserver target machine.
Send payload to vulnserver target machine.
Build a fuzzer.
Test the connectivity with the server.
Send multiple HTTP post requests with long usernames.
Generate all possible hexadecimal numbers from 00 to FF.
Find bad characters.
Create a shell code payload without bad characters.
Assembly language
where you will learn
Types of registers.
Data transfer instructions.
Little Endian and big Endian order.
Defining data.
Boolean and comparison instructions.
Conditional structure.
Jump and loop instructions.
Stack operations and using procedures .
And overflow.
Notes:
Please note the information contained in this course is for educational purposes only