• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software Network Penetration Testing by using Python (1 Viewer)

Currently reading:
 IT & Software Network Penetration Testing by using Python (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
3
Joined
Nov 21, 2025
Threads
839
Likes
66
Awards
8
Credits
16,798©
Cash
0$
image-150.png



Employ the power of Python programming to create programs for network penetration testing.


The student will learn about the network hacking or penetration testing concept without any tools in this Course. The Course is divided into 6 Sections or chapters.


In the first chapter, you will learn about socket programming and its concept. You will also learn about Wireshark and its filters.


In the second chapter, you will learn the scanning process. The chapter includes coding IP scanners (ping sweep), threaded IP scanners, port scanners, and threaded port scanners.


The Third chapter teaches you about the sniffing process. You will learn how to create the sniffers of Ethernet, Network, and TCP layers. You will also learn about ARP protocol and how to perform ARP spoofing attacks. With the help of a sniffer, you can create your Intrusion detection system.


The fourth chapter deals with the DHCP server concept and its attack. You will learn how to config a DHCP server and create a program to launch a DHCP starvation attack.


In the Fifth chapter, you will learn about wireless frames. You will see how to capture important information such as SSID, BSSID, and channel number from the wireless Acess Point (AP). You will learn about scanning wireless frames, de-auth attacks, and finding the client connected to AP.


In the Sixth chapter, students will learn about the honeypot creation. How to give fake ARP and ICMP (ping) replies. You will learn about unlisted DHCP attacks. You will know how to send a fake port open reply or a fake three-way handshake.



Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom