Python 道德黑客大师班 - 从零到精通
Python Ethical Hacking MASTERCLASS - Zero to Mastery
- 1. Introduction
- 1. Python Ethical Hacking Introduction to Your New Superpower
- 2. Hacking vs. Ethical Hacking Understanding the Fine Line
- 3. Ethical Hacking Navigating the Legal and Ethical Landscape
- 2. Python Environmental Setup
- 1. Python for Ethical Hacking Your Ticket to Cybersecurity Success
- 2. Python Installation
- 3. Creating Your Ideal Workspace VS Code Setup for Ethical Hacking
- 3. Python Essentials
- 1. Building Your First Ethical Hacking Tool Writing Your First Python Script
- 2. Documenting Your Work Adding Comments to Your Ethical Hacking Code
- 3. Storing and Retrieving Data Working with Variables in Ethical Hacking
- 4. Data Structures for Hacking Understanding Common Data Types in Ethical Hacking
- 5. Making Your Move Using Python Operators for Ethical Hacking
- 6. Engaging with Your Targets Accepting User Input in Ethical Hacking Scripts
- 7. Manipulating Your Way to Success String Functions in Ethical Hacking
- 4. Python Decision Control
- 1. Making Decisions with Confidence Conditional Statements in Ethical Hacking Code
- 5. Python LoopIteration
- 1. Keep Hacking Mastering Loops with While Statements
- 2. Hacking with Style Using For Loops in Ethical Hacking
- 3. Controlling the Flow Conditional Statements in Loops for Ethical Hacking
- 6. Python SequenceData Structures
- 1. Data Management for Ethical Hacking Working with Python Lists
- 2. Managing Key-Value Pairs Python Dictionaries for Ethical Hacking
- 3. The Power of Unordered Collections Python Sets for Ethical Hacking
- 7. Python FunctionModules
- 1. Creating Your Own Tools Defining Functions in Ethical Hacking
- 2. Ethical Hacking with Purpose Adding Arguments to Your Functions
- 3. Enhancing Your Tools Python Modules for Ethical Hacking
- 8. Python ClassesObjects
- 1. From Data to Objects Understanding Classes in Ethical Hacking
- 2. Building on the Basics Class Inheritance in Ethical Hacking
- 9. Python Exception Handling
- 1. When Things Go Wrong Handling Exceptions in Ethical Hacking
- 10. Python Network Programming
- 1. Exploring Network Programming Understanding the Basics
- 2. Building a Server Application Putting Your Ethical Hacking Skills to Use
- 3. Building a Client Application Enhancing Your Ethical Hacking Skills
- 11. File IO
- 1. Working with Files Managing Data in Ethical Hacking
- 2. Enhancing Your Ethical Hacking Skills Raising Exceptions and the Else Clause.
- 12. Setting Up Your Testing Lab
- 1. Getting Ready for Action Introduction to Ethical Hacking Lab Installation
- 2. Virtualization Made Easy How to Install VirtualBox on Windows 10
- 3. The Power of Kali Linux Installing Kali Linux on VirtualBox
- 4. Practice Makes Perfect Installing Metasploitable2 on VirtualBox
- 13. Intro to Linux Commands
- 1. Navigating the Command Line Basic Linux Commands for Ethical Hacking
- 14. Anonimity Tactics
- 1. Staying Stealthy Techniques for Maintaining Anonymity in Ethical Hacking
- 15. Information Gathering Tools
- 1. Getting the Goods IP Grabbing in Ethical Hacking
- 2. Finding the Source Using Whois Lookup Tools in Ethical Hacking
- 16. Port Scanning Tools
- 1. Scanning for Open Doors Port Scanning with Python Socket Module
- 2. Taking Port Scanning to the Next Level Port Scanning with Nmap Module
- 17. Gaining Acess Tool
- 1. Cracking the Code Password Cracking Part 1 in Ethical Hacking
- 2. Cracking the Code Continues Password Cracking Part 2 in Ethical Hacking
- 18. Maintaining Access Tool
- 1. Backdoor Target Application
- 2. The Other Side of the Coin Backdoor Attacking Applications in Ethical Hacking
- 19. Wrapping Up
- 1. Ethical Hacking The Final Frontier.