وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Golang Hacking

سرفصل های دوره

1. Introduction to course
  • 1. Welcome to this course
  • 2. Note announcement
  • 3. Introduction to Networking

  • 2. What is Hacking
  • 1. Hacking Introduction

  • 3. Installation
  • 1.1 Windows 10.html
  • 1.1 kali linux.html
  • 1.2 Windows 10.html
  • 1.2 kali linux.html
  • 1. Tools required
  • 2. Installing go in windows
  • 3. IDE to use
  • 4. Linux Installation
  • 5. Setting up golang

  • 4. Executing System Commands
  • 1. How to execute commands
  • 2. Refactoring code

  • 5. Changing MAC
  • 1. Running ifconfig command on PC
  • 2. Changing MAC using ifconfig
  • 3. Creating a program to automatically change MAC
  • 4. Creating executable and parsing flags

  • 6. Creating Network Scanner
  • 1. Creating a TCP scanner basic
  • 2. Scanning Multiple ports
  • 3. Scanning Multiple ports continued
  • 4. TCP scanner Concurrent
  • 5. TCP scanner Concurrent continued
  • 6. Network Mapper Introduction - NMAP
  • 7. Nmap in golang
  • 8. Creating an nmap program in golang

  • 7. Source Code
  • 1. Source code.html

  • 8. Man in the Middle Attack - MITM with ARP
  • 1. Address Resolution Protocol - ARP
  • 2. ARP spoofing
  • 3. Installing ARP spoof Program
  • 4. Enabling IP packet forwarding
  • 5. Performing MITM attack
  • 6. Capturing Intercepted Packets

  • 9. Intercepting Packets
  • 1. Installing gopacket package in golang
  • 2. Finding devices
  • 3. searching for devices over a machine
  • 4. Capturing Packets
  • 5. intercepting live traffic
  • 6. Intercepting traffic from source
  • 7. Spoofed packets
  • 8. Stealing Credentials
  • 9. Stealing Logins over HTTP

  • 10. Malware - Creating your own Malware Backdoor RAT
  • 1. Introduction to malware
  • 2. Creating Hacker Server
  • 3. Writing Victim Program
  • 4. Running Server and Victim Programs
  • 5. Clean up server program
  • 6. Clean up victim program
  • 7. Sending Data from server to victim
  • 8. Receiving data from hacker server
  • 9. Sending gob structs to victim
  • 10. Receiving gob structs at victim machine
  • 11. Running the program to send and receive gobs
  • 12. Executing command server side
  • 13. Exit condition
  • 14. Victim Side main function
  • 15. Server logic command execution
  • 16. Victim Logic command execution
  • 17. Victim Logic command execution Part 2
  • 18. Minor Error
  • 19. Executing Commands Complete program

  • 11. Malware - File System Navigation
  • 1. Introduction
  • 2. setting up victim machine_s main program
  • 3. Sending initial current directory to Hacker
  • 4. Receiving initial pwd in server
  • 5. Getting user input
  • 6. Reading User Command
  • 7. Getting Back results
  • 8. Loop Navigation on server side
  • 9. Exit Condition on server
  • 10. Loop navigation on victim side
  • 11. Running the program

  • 12. Malware - Uploading Viruses to victim
  • 1. Introduction how to transfer files
  • 2. Setting main function
  • 3. Check File_s existence
  • 4. Reading file contents
  • 5. Creating buffer
  • 6. Sending File to victim machine
  • 7. Setting up main function in victim
  • 8. Saving file on victim_s disk
  • 9. Getting back write status
  • 10. Uploading a file

  • 13. Malware - Downloading Files from Victim
  • 1. Setting up main function in victim machine
  • 2. Getting the list of files in current directory
  • 3. Sending list to hacker
  • 4. Receiving list at hacker
  • 5. Getting user input
  • 6. Converting user input to integer
  • 7. Sending file names to victim
  • 8. Reading file content from victim
  • 9. Writing File content hacker
  • 10. Downloading the file to hacker machine

  • 14. Malware - Stealing Folders from victim
  • 1. Downloading folder from victim
  • 2. Setting main function
  • 3. getting folders
  • 4. sending folder list to hacker
  • 5. Getting folder list and selecting folder
  • 6. getting folder name on victim
  • 7. Creating Zip file
  • 8. Zip file continued
  • 9. Connection
  • 10. Running Program

  • 15. Trojan - packaging a malware
  • 1. Introduction to trojan
  • 2. Packaging
  • 3. Running executables
  • 4. Running our malware
  • 5. Hiding console on victim
  • 6. Batch file
  • 7. Batch to exe
  • 8. Adding icon to executable
  • 9. Running exe
  • 10. How to perform attack over public internet

  • 16. Keylogger
  • 1. Creating a keylogger using go-keylogger package
  • 2. Starting keylogger

  • 17. Stegnography
  • 1. Stegnography Introduction
  • 2. Installing Package
  • 3. Encoding Data
  • 4. Decoding Data

  • 18. Protection - How to protect yourself when online
  • 1. Protection
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 9048
    حجم: 3478 مگابایت
    مدت زمان: 477 دقیقه
    تاریخ انتشار: 15 فروردین 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید