Description
The course “Ethical Hacking: Building an Information Stealer Using Python 3” was just published in 2024. In this course, you will learn how to design and build a fully functional “information thief” that you can use for educational purposes on your computer. or on remote computers at your workplace, or even for clients, for whom Red exercises Team you do can also be used. Once we are done creating this tool, it will have three options:
- Keylogging: all keys pressed are recorded in internal memory, via a UNC path or to a shared network folder.
- Page Snapshot (Screenshots): A screenshot of the page is taken at certain intervals that you specify in the code. These photos are stored in internal memory, in a UNC path, or in a shared network folder.
- Clipboard: This function works the same as taking a screenshot, except that at regular intervals, the information on the clipboard is copied and saved to a file in internal memory, a UNC path, or a network share. . . is saved.
This course will explain all the code so beginners have nothing to worry about, but more experienced programmers may learn something new and the end product will be truly amazing. I’ll also teach you how to convert Python code into a single executable, including the Python code and all its dependencies. Then, when it comes time to run Python on the target machine, that system will no longer need to use Python and our code will still work. Finally, I’ll show you some Windows commands that are typically enabled or available on corporate or government networks that use Microsoft Active Directory (AD). If you are part of the same domain and have the appropriate credentials, you can use these commands to remotely execute Python code on the target machine.
What you’ll learn in the Ethical Hacking: Design an Information Stealer Using Python 3 course
- Programming in Python and creating a hacker that can be used for cybersecurity tests or educational purposes.
- Write code for the keylogger, including code that takes screenshots and code that copies everything saved to the clipboard.
- Remote code execution on a target computer that you access via winsrs, psexec or wmic.
- Run the code on your local machine
- Run your code on target machines that don’t have Python installed.
Who is this course suitable for?
This course is suitable for anyone interested in creating their own ethical hacking tools using the Python 3 programming language. This is a great course to start with because it is not too complicated, but is very practical.
Course Details: Ethical Hacking: Designing Information Theft Using Python 3
- Publisher: Udemy
- Instructor: Bill Reed
- Level of training: from beginner to advanced
- Duration of training: 1 hour 48 minutes.
- Number of courses: 12
Course headings
Ethical Hacking Course Prerequisites: Developing an Info Stealer Using Python 3
- No programming experience required. I’ll walk you through each line of code and explain everything.
course images
Example video course
installation instructions
Once extracted, watch using your favorite player.
English subtitles
Quality: 720p
Download link
Password for file(s): www.downloadly.ir
size
849 MB