• Post category:StudyBullet-2
  • Reading time:13 mins read

Learn ethical hacking, penetration testing and network security while working on Python coding projects!

What you will learn

Ethical Hacking

Python Programming

Penetration Testing

Network Security

Port and Vulnerability Scanning

SSH and FTP Attacks

Password Cracking

Sniffers, Flooders and Spoofers

DNS Spoofing

Network Analysis

Multi-functioning Reverse Shell


If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course:

  • Introduction and setup
  • Port and vulnerability scanning
  • SSH and FTP attacks
  • Password cracking
  • Sniffers, flooders and spoofers
  • DNS spoofing
  • Network analysis
  • Coding a multi-functioning reverse shell
  • Keyloggers
  • Command and control center
  • Website penetration testing

This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.

Still not sold? Check out these great reviews!

“It’s already fun wow. I enjoy learning ethical hacking and python”

“Great even for non-programmers!”

“Great Course”

Thank you for taking the time to read this and we hope to see you in the course!




Introduction and Setup

Welcome to Python for ethical hacking!

VirtualBox installation

Kali Linux installation

Adding Guest Additions

Python in Kali terminal

Port and Vulnerability Scanning

Coding a simple port scanner

Adding raw_input to our port scanner

Scanning the first 1,000 ports

Coding an advanced port scanner part 1

Coding an advanced port scanner part 2

Finishing and testing our scanner

Configuring IP address and installing Metasploitable

Returning banner from open port

Coding a vulnerability scanner part 1

Coding a vulnerability scanner part 2

SSH and FTP Attacks

Automating SSH login part 1

Automating SSH login part 2

Testing our SSH login program

Coding a SSH brute-forcer

Executing commands on target after brute-forcing SSH

Anonymous FTP login attack

Username & password list attack on FTP

Password Cracking

SHA256, SHA512, MD5

Cracking SHA1 hash with online dictionary

Getting password from MD5 hash

Cracking crypt passwords with salt

Sniffers, Flooders and Spoofers

Changing MAC address manually

Coding MAC address changer

Theory behind ARP spoofing

Crafting malicious ARP packet

Coding ARP spoofer

Forwarding packets and restoring ARP tables

Spoofing our IP address and sending message with TCP payload

Running SynFlooder with changed source IP address

Getting source and destination MAC address from received packets

Sniffing FTP username and password part 1

Get Instant Notification of New Courses on our Telegram channel.

Sniffing FTP username and password part 2

Getting passwords from HTTP websites

Coding DNS Spoofer

Cloning any webpage

Printing DNS queries

Redirecting response to cloned page

Setting IP table rules and running DNS spoofer

Network Analysis

Analyzing Ethernet header

Analyzing IP header part 1

Analyzing IP header part 2

Analyzing TCP header

Analyzing UDP header

Multi-functioning Reverse Shell

Theory behind socket programming

Wine and Pyinstaller installation

Setting up listener

Establishing connection between target and server

Implementing send & receive functions

Executing commands on target system

Importing JSON library to parse data

Converting Python backdoor to .exe

Using OS library to change directory

Downloading & uploading files to target PC

Hiding our backdoor and creating persistence

Trying to connect to server every 20 seconds

Downloading files to target PC

Capturing screenshot on target PC

Administrator privilege check

Starting other programs with our shell

Running our shell as an image, audio, PDF

Coding a Keylogger

Installing Pynput

Printing space character

Calling timer on our keylogger

Adding keylogger to our backdoor

Command and Control Center

What is a threaded server?

Accepting connections with a thread

Managing multiple sessions

Testing threaded server with Windows 10 target

Fixing Q command

Coding exit function

Attacking multiple targets and gathering botnet

Website Penetration Testing

Stealing saved wireless passwords

Saving passwords to a file

Bruteforcing Gmail

Bruteforcing any login page part 1

Bruteforcing any login page part 2

Finding hidden directories part 1

Finding hidden directories part 2

Discovering subdomains

Changing HTTP headers

Starting basic and digest authentication bruteforcer

Controlling threads

Coding run function

Printing usage and testing our program

Taking a look at ransomware