وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

Golang Hacking

سرفصل های دوره

1. Introduction to course
  • 1. Welcome to this course
  • 2. Note announcement
  • 3. Introduction to Networking

  • 2. What is Hacking
  • 1. Hacking Introduction

  • 3. Installation
  • 1.1 Windows 10.html
  • 1.1 kali linux.html
  • 1.2 Windows 10.html
  • 1.2 kali linux.html
  • 1. Tools required
  • 2. Installing go in windows
  • 3. IDE to use
  • 4. Linux Installation
  • 5. Setting up golang

  • 4. Executing System Commands
  • 1. How to execute commands
  • 2. Refactoring code

  • 5. Changing MAC
  • 1. Running ifconfig command on PC
  • 2. Changing MAC using ifconfig
  • 3. Creating a program to automatically change MAC
  • 4. Creating executable and parsing flags

  • 6. Creating Network Scanner
  • 1. Creating a TCP scanner basic
  • 2. Scanning Multiple ports
  • 3. Scanning Multiple ports continued
  • 4. TCP scanner Concurrent
  • 5. TCP scanner Concurrent continued
  • 6. Network Mapper Introduction - NMAP
  • 7. Nmap in golang
  • 8. Creating an nmap program in golang

  • 7. Source Code
  • 1. Source code.html

  • 8. Man in the Middle Attack - MITM with ARP
  • 1. Address Resolution Protocol - ARP
  • 2. ARP spoofing
  • 3. Installing ARP spoof Program
  • 4. Enabling IP packet forwarding
  • 5. Performing MITM attack
  • 6. Capturing Intercepted Packets

  • 9. Intercepting Packets
  • 1. Installing gopacket package in golang
  • 2. Finding devices
  • 3. searching for devices over a machine
  • 4. Capturing Packets
  • 5. intercepting live traffic
  • 6. Intercepting traffic from source
  • 7. Spoofed packets
  • 8. Stealing Credentials
  • 9. Stealing Logins over HTTP

  • 10. Malware - Creating your own Malware Backdoor RAT
  • 1. Introduction to malware
  • 2. Creating Hacker Server
  • 3. Writing Victim Program
  • 4. Running Server and Victim Programs
  • 5. Clean up server program
  • 6. Clean up victim program
  • 7. Sending Data from server to victim
  • 8. Receiving data from hacker server
  • 9. Sending gob structs to victim
  • 10. Receiving gob structs at victim machine
  • 11. Running the program to send and receive gobs
  • 12. Executing command server side
  • 13. Exit condition
  • 14. Victim Side main function
  • 15. Server logic command execution
  • 16. Victim Logic command execution
  • 17. Victim Logic command execution Part 2
  • 18. Minor Error
  • 19. Executing Commands Complete program

  • 11. Malware - File System Navigation
  • 1. Introduction
  • 2. setting up victim machine_s main program
  • 3. Sending initial current directory to Hacker
  • 4. Receiving initial pwd in server
  • 5. Getting user input
  • 6. Reading User Command
  • 7. Getting Back results
  • 8. Loop Navigation on server side
  • 9. Exit Condition on server
  • 10. Loop navigation on victim side
  • 11. Running the program

  • 12. Malware - Uploading Viruses to victim
  • 1. Introduction how to transfer files
  • 2. Setting main function
  • 3. Check File_s existence
  • 4. Reading file contents
  • 5. Creating buffer
  • 6. Sending File to victim machine
  • 7. Setting up main function in victim
  • 8. Saving file on victim_s disk
  • 9. Getting back write status
  • 10. Uploading a file

  • 13. Malware - Downloading Files from Victim
  • 1. Setting up main function in victim machine
  • 2. Getting the list of files in current directory
  • 3. Sending list to hacker
  • 4. Receiving list at hacker
  • 5. Getting user input
  • 6. Converting user input to integer
  • 7. Sending file names to victim
  • 8. Reading file content from victim
  • 9. Writing File content hacker
  • 10. Downloading the file to hacker machine

  • 14. Malware - Stealing Folders from victim
  • 1. Downloading folder from victim
  • 2. Setting main function
  • 3. getting folders
  • 4. sending folder list to hacker
  • 5. Getting folder list and selecting folder
  • 6. getting folder name on victim
  • 7. Creating Zip file
  • 8. Zip file continued
  • 9. Connection
  • 10. Running Program

  • 15. Trojan - packaging a malware
  • 1. Introduction to trojan
  • 2. Packaging
  • 3. Running executables
  • 4. Running our malware
  • 5. Hiding console on victim
  • 6. Batch file
  • 7. Batch to exe
  • 8. Adding icon to executable
  • 9. Running exe
  • 10. How to perform attack over public internet

  • 16. Keylogger
  • 1. Creating a keylogger using go-keylogger package
  • 2. Starting keylogger

  • 17. Stegnography
  • 1. Stegnography Introduction
  • 2. Installing Package
  • 3. Encoding Data
  • 4. Decoding Data

  • 18. Protection - How to protect yourself when online
  • 1. Protection
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 9048
    حجم: 3478 مگابایت
    مدت زمان: 477 دقیقه
    تاریخ انتشار: ۱۵ فروردین ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید