-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Learn Python and Ethical Hacking from Scratch
By :
Learn Python and Ethical Hacking from Scratch
By:
Overview of this book
Are you intrigued by how hackers hack into any computer system easily? Do you want to develop the same skills, but not sure where to start? Don’t worry! This course has got you covered. By combining the power of Python and ethical hacking skills, this course shows you how to write Python programs to break into any computer system with ease.
The course starts with the fundamentals of ethical hacking and Python programming and guides you through the installation process of the software needed. Once the setup is ready, you will learn Python programming from scratch and start writing hacking programs without any delay. You will learn how a system works and find its weaknesses and will learn how to then write a Python program to exploit those weaknesses to hack the system.
To master the craft of hacking, you will learn to write ethical hacking programs from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools, the list goes on. You will also have gained a deep understanding of how computer systems work and how to model problems, design an algorithm to solve problems, and implement solutions using Python.
By the end of this course, you will be well-versed with Python programming and will have developed the skills to write programs in Python to hack a system.
All the code files are placed at https://github.com/PacktPublishing/Learn-Python-and-Ethical-Hacking-From-Scratch
Table of Contents (19 chapters)
Introduction
Writing a Media Access Control (MAC) Address Changer - Python Basics
Media Access Control (MAC) Changer - Algorithm Design
Programming a Network Scanner
Writing an Address Resolution Protocol (ARP) Spoofer
Writing a Packet Sniffer
Writing a Domain Name Server (DNS) Spoofer
Writing a File Interceptor
Writing a Code Injector
Bypassing HTTPS
Writing an Address Resolution Protocol (ARP) Spoof Detector
Writing Malware
Writing Malware - Keylogger
Writing Malware – Backdoors
Writing Malware – Packaging
Website/Web Application Hacking
Website Hacking - Writing a Crawler
Writing a Program to Guess Login Information
Writing a Vulnerability Scanner
Customer Reviews