Published 12/2022
Created by Mohit .
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 40 Lectures ( 7h 0m ) | Size: 3.28 GB
Employ the power of Python programming to create programs for network penetration testing.
What you’ll learn
Students will learn the use of Python programming in Network Penetration testing.
They will learn the implementation of network attacks such as scanning, sniffing, DHCP server attack, and Wireless attack
They can enhance their knowledge of network security by creating their tools. Students can launch different attacks to check the vulnerability of network system
Students can make software to detect the different types of network attacks.
Students can do new research by applying by creating their own tools and detection mechanism.
Requirements
Basic of Python, Networking and Linux
Description
The student will learn about the network hacking or penetration testing concept without any tools in this Course. The Course is divided into 6 Sections or chapters. In the first chapter, you will learn about socket programming and its concept. You will also learn about Wireshark and its filters. In the second chapter, you will learn the scanning process. The chapter includes coding IP scanners (ping sweep), threaded IP scanners, port scanners, and threaded port scanners. The Third chapter teaches you about the sniffing process. You will learn how to create the sniffers of Ethernet, Network, and TCP layers. You will also learn about ARP protocol and how to perform ARP spoofing attacks. With the help of a sniffer, you can create your Intrusion detection system. The fourth chapter deals with the DHCP server concept and its attack. You will learn how to config a DHCP server and create a program to launch a DHCP starvation attack. In the Fifth chapter, you will learn about wireless frames. You will see how to capture important information such as SSID, BSSID, and channel number from the wireless Acess Point (AP). You will learn about scanning wireless frames, de-auth attacks, and finding the client connected to AP. In the Sixth chapter, students will learn about the honeypot creation. How to give fake ARP and ICMP (ping) replies. You will learn about unlisted DHCP attacks. You will know how to send a fake port open reply or a fake three-way handshake.
Who this course is for
Networking guy who wants to be network hacker, or pen-tester
Password/解压密码www.tbtos.com
转载请注明:0daytown » Network Penetration Testing by using Python