<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Python Ethical Hacking :: Teknolabs</title>
    <link>https://teknolabs.net/courses/python/python-ethical-hacking/index.html</link>
    <description>Python Ethical Hacking What You’ll Learn Throughout the course, you’ll dive deep into the following advanced topics:&#xA;Lab 01 - Port Scanner – Learn how to build a port scanner to identify open ports on a target system. Lab 01 - Challenge Lab 02 - SSH Brute Forcer - Learn how to build an SSH brute forcer to crack weak passwords. Lab 02 - Challenge Lab 03 — ARP Spoofer - Learn how to build an ARP spoofer to intercept network traffic.</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="https://teknolabs.net/courses/python/python-ethical-hacking/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Lab 01 — Port Scanner</title>
      <link>https://teknolabs.net/courses/python/python-ethical-hacking/lab_01_port_scanner/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://teknolabs.net/courses/python/python-ethical-hacking/lab_01_port_scanner/index.html</guid>
      <description>Introduction TCP and the Three-Way Handshake TCP (Transmission Control Protocol) is connection-oriented. Before any data is exchanged, two hosts must agree to talk. This agreement is called the three-way handshake:&#xA;A port scanner exploits this: if the server replies with a SYN-ACK, the port is open. If it replies with RST (reset), the port is closed. If there is no reply at all, the port is likely filtered by a firewall.</description>
    </item>
    <item>
      <title>Challenge Lab 01 - Port Scanner</title>
      <link>https://teknolabs.net/courses/python/python-ethical-hacking/lab_01_port_scanner_challenges/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://teknolabs.net/courses/python/python-ethical-hacking/lab_01_port_scanner_challenges/index.html</guid>
      <description>⚠️ Avertissement légal &amp; éthique : exécutez ces exercices uniquement sur vos propres machines/VMs ou sur des environnements dédiés au lab avec autorisation explicite. Le port‑scanning et la collecte d’informations sur des systèmes tiers sans accord sont illégaux.&#xA;Exercice 1 — Premiers pas avec socket Objectif : créer une connexion TCP simple en Python.&#xA;Énoncé : Écrivez une fonction tcp_connect(host, port) qui tente d’ouvrir une connexion TCP vers host:port et retourne True si la connexion réussit, False sinon.</description>
    </item>
    <item>
      <title>Lab 02 — SSH Brute Forcer</title>
      <link>https://teknolabs.net/courses/python/python-ethical-hacking/lab_02_ssh_brute_forcer/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://teknolabs.net/courses/python/python-ethical-hacking/lab_02_ssh_brute_forcer/index.html</guid>
      <description>Ethical Hacking with Python ⚠️ This tool must only be used against systems you own or have written permission to test. Brute-forcing SSH without permission is a criminal offence. Use Metasploitable 2 in a local VM, or your own machine with SSH enabled.&#xA;What is a Brute Force Attack? A brute force attack is simple: try many passwords, one after the other, until one works. It succeeds because people choose weak, predictable passwords.</description>
    </item>
    <item>
      <title>Challenge Lab 02 — SSH &amp; Paramiko</title>
      <link>https://teknolabs.net/courses/python/python-ethical-hacking/lab_02_ssh_brute_forcer_challenges/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://teknolabs.net/courses/python/python-ethical-hacking/lab_02_ssh_brute_forcer_challenges/index.html</guid>
      <description>⚠️ Avertissement légal &amp; éthique — Tout essai d’authentification doit être réalisé exclusivement sur vos propres machines/VMs ou un lab explicitement autorisé. Ne lancez jamais ces scripts sur des systèmes tiers.&#xA;Exercice 1 — Installation &amp; vérification de Paramiko Objectif : vérifier l’environnement Python/Paramiko.&#xA;Énoncé :&#xA;Installez Paramiko. Affichez sa version. Indices : pip install paramiko; python3 -c &#34;import paramiko; print(paramiko.__version__)&#34;.&#xA;Exercice 2 — Sonde d’authentification SSH minimaliste Objectif : distinguer success / failure / error.</description>
    </item>
    <item>
      <title>Lab 03 — ARP Spoofer</title>
      <link>https://teknolabs.net/courses/python/python-ethical-hacking/lab_03_arp_spoofer/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://teknolabs.net/courses/python/python-ethical-hacking/lab_03_arp_spoofer/index.html</guid>
      <description>Ethical Hacking with Python ⚠️ This lab must only be run inside an isolated virtual network you fully control. ARP spoofing on any network you do not own is a criminal offence. Use Host-Only or Internal networking in VirtualBox/VMware — never connect your lab VMs to the internet or a real LAN.&#xA;What is ARP and Why is it Vulnerable? When your computer wants to send data to another machine on the same network, it needs two things: the destination’s IP address (which you usually know) and its MAC address (the physical hardware address, which you don’t always know).</description>
    </item>
    <item>
      <title>Challenge Lab 03 — ARP &amp; Scapy</title>
      <link>https://teknolabs.net/courses/python/python-ethical-hacking/lab_03_arp_spoofer_challenges/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://teknolabs.net/courses/python/python-ethical-hacking/lab_03_arp_spoofer_challenges/index.html</guid>
      <description>⚠️ Avertissement légal &amp; éthique — L’ARP spoofing perturbe le réseau et peut intercepter du trafic. N’exécutez ces exercices que sur un réseau de lab isolé (Host‑Only / Internal) que vous contrôlez intégralement. Jamais sur un réseau tiers (université, travail, domicile connecté à Internet).&#xA;Exercice 1 — OSI (rappel ciblé) Objectif : situer ARP par rapport aux couches 2/3.&#xA;Énoncé : En 3–5 lignes, expliquez pourquoi ARP « relie » IP (couche 3) et Ethernet (couche 2).</description>
    </item>
  </channel>
</rss>