Ethical Hacking: Design Command and Control using Python 3
Learn Python and code a c2 tool that you can use for Red Team exercises, Penetration Tests, or for educational purposes
Created by Bill Reed | 18.5 hours on-demand video course
Greetings course seekers. My course, “Ethical Hacking: Design Command and Control using Python 3” is hot off the press here in 2024. The course is divided up into sections with each video building upon the last. At the end of each section, I always do a Python summary review that speaks directly to the new Python code we covered during a section of the course. Some of you that have Python experience may want to skip these videos, but for beginners or for those who are rusty, I recommend watching them.
What you’ll learn
- Python coding and how to build a feature rich command and control tool that you can use for authorized cybersecurity tests, for fun, or for educational purposes
- How to code the client and server portions of the tool and enable them to interact with each other
- How to run the client code on target computers that do not have Python installed
- How to build the client code for either Windows or Linux operating systems
- How to implement AES encryption for all traffic between client and server
- How to implement the following features in your tool: reverse shell, key logging, screen captures, clipboard stealing, turning volume up, playing audio files
- And more features: displaying images, upload/download of files, zip/encrypt of files, unzip/decrypt of files
- And more features: running operating system commands in the background, flipping computer’s screen upside down, typing on the compromised computer
- How to allow for multiple compromised computers to communicate to the c2 server and switch control over them
- Numerous Python concepts and terminology; every line or block of code is explained
- How to use Wireshark, Windows Subsystem for Linux (WSL), Ubuntu Linux, and PyCharm Community Edition Integrated Development Environment (IDE)
- How to operate the c2 server in a cloud, and more
Recommended Course
Wi-Fi Hacking and Wireless Penetration Testing Course Best seller
Learn Ethical Hacking Using The Cloud From Scratch
Web Security & Bug Bounty: Learn Penetration Testing in 2024
Complete Ethical Hacking Bootcamp 2024: Zero to Mastery
Who this course is for:
- Ideally, it is for those that have some basic knowledge in at least one programming language and has an interest or experience in ethical hacking/offensive cybersecurity and would like to learn how to build their own tools. However, I start at ground zero and explain every line or block of code, thus beginners can follow along and learn too. Full source code is available within the course, which allows those that do not care about learning the Python or those that already know Python to skip most of the lessons if they prefer, but still be able to use the code.