Uthena

Course description

Would you like to learn how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools because this knowledge can be useful for you to advance your ethical hacking career?

In this course you will learn:

  • Python for ethical hacking!
  • Port and vulnerability scanning
  • SSH & FTP attacks
  • Password cracking
  • Sniffers, flooders, and spoofers
  • Coding DNS spoofer
  • Network analysis
  • and more…


This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

Course curriculum

    1. Making simple port scanner

    2. Adding raw_input to our port scanner

    3. Scanning first 1000 ports

    4. Coding advance port scanner - part 1

    5. Coding advance port scanner - part 2

    6. Finishing and testing advance port scanner

    7. Configuring IP address and installing Metasploitable

    8. Returning banner from open port

    9. Coding vulnerability scanner - part 1

    10. Coding vulnerability scanner - part 2

    1. Automating SSH login - part 1

    2. Automating SSH login - part 2

    3. Testing SSH login program

    4. Coding SSH Bruteforcer

    5. Executing command on target after brute forcing SSH

    6. Anonymous FTP login attack

    7. Username & password list attack on FTP

    1. SHA256, SHA512 and MD5

    2. Cracking SHA1 hash with online dictionary

    3. Getting password from MD5 hash

    4. Cracking crypt password with Salt

    1. Changing MAC address manually

    2. Coding MAC changer

    3. Theory behind ARP spoofing

    4. Crafting malicious ARP packet

    5. Coding ARP spoofer

    6. Forwarding packets and restoring ARP tables

    7. Spoofing our IP address and sending message with TCP payload

    8. Running SynFlooder with changed source IP address

    9. Getting source and destination MAC address from received packets

    10. Sniffing FTP username and password - part 1

    11. Sniffing FTP username and password - part 2

    12. Getting passwords from HTTP websites

    1. Cloning any webpage

    2. Printing DNS queries

    3. Redirecting response to cloned page

    4. Setting IP table rules and running DNS spoofer

About this course

  • $37.81
  • 89 lessons
  • 17.5 hours of video content

Private Label Rights (PLR)

This course is available with Private Label Rights (PLR). 

When you buy a course with private label rights on Uthena, the author of the course gives you permission to download the course and sell it as your own on your website according to the terms of the PLR license included.

If you would like to know more about the license terms, please visit this page.

After purchasing, you will have access to the course on Uthena and you will receive the PLR license with a download link and a special bonus.

Uthena

See a sample of the PLR license.

You have the option to buy Master Resell Rights (MRR) to this course, which allows your customers to have the right to sell the course as well.

See a sample of the MRR license.

Take this course today!

"Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools"

You can buy Private Label Rights (PLR) for this course and others, click here.

You can buy Master Resell Rights (MRR) for this course and others, click here.