-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Python Ethical Hacking from Scratch
By :

Now that we have seen what the outline of our malware program will look like, let's start writing our hacker and victim programs.
In this section, we will write a program for the hacker server, which will constantly listen for incoming connections originating from the victim's machine to the hacker. Let's go to our Kali machine and create a new project called hacker server
. Also, create a new virtual environment, as we have done in previous chapters. We will not require any external library in this section, but it is always a good idea to use virtual environments to keep track of dependencies in our program. Also, create a new file called server.py
.
The IP address of our Kali machine is 192.168.74.128
, and for the victim's Windows machine, it is 192.168.74.129
. Next, we need to select which port we will be listening on for incoming connections. You can select any port above 1024
and less than 65355
. However, we will use port...