Section 1 : Introduction and Setup

Lecture 1 Welcome to Python for ethical hacking! 00:05:16 Duration
Lecture 2 VirtualBox installation 00:11:39 Duration
Lecture 3 Kali Linux installation 00:17:06 Duration
Lecture 4 Adding Guest Additions 00:15:07 Duration
Lecture 5 Python in Kali terminal 00:13:32 Duration

Section 2 : Port and Vulnerability Scanning

Lecture 1 Coding a simple port scanner 00:15:30 Duration
Lecture 2 Adding raw_input to our port scanner 00:09:21 Duration
Lecture 3 Scanning the first 1,000 ports 00:04:46 Duration
Lecture 4 Coding an advanced port scanner part 1
Lecture 5 Coding an advanced port scanner part 2 00:08:48 Duration
Lecture 6 Finishing and testing our scanner 00:08:55 Duration
Lecture 7 Configuring IP address and installing Metasploitable 00:08:14 Duration
Lecture 8 Returning banner from open port 00:14:45 Duration
Lecture 9 Coding a vulnerability scanner part 1 00:11:55 Duration
Lecture 10 Coding a vulnerability scanner part 2 00:07:20 Duration

Section 3 : SSH and FTP Attacks

Lecture 1 Automating SSH login part 1 00:09:55 Duration
Lecture 2 Automating SSH login part 2 00:09:20 Duration
Lecture 3 Testing our SSH login program 00:08:34 Duration
Lecture 4 Coding a SSH brute-forcer 00:10:37 Duration
Lecture 5 Executing commands on target after brute-forcing SSH 00:10:10 Duration
Lecture 6 Anonymous FTP login attack 00:09:53 Duration
Lecture 7 Username & password list attack on FTP

Section 4 : Password Cracking

Lecture 1 SHA256, SHA512, MD5 00:08:37 Duration
Lecture 2 Cracking SHA1 hash with online dictionary 00:16:41 Duration
Lecture 3 Getting password from MD5 hash 00:13:23 Duration
Lecture 4 Cracking crypt passwords with salt 00:24:02 Duration

Section 5 : Sniffers, Flooders and Spoofers

Lecture 1 Changing MAC address manually 00:08:34 Duration
Lecture 2 Coding MAC address changer 00:16:56 Duration
Lecture 3 Theory behind ARP spoofing 00:04:42 Duration
Lecture 4 Crafting malicious ARP packet 00:19:26 Duration
Lecture 5 Coding ARP spoofer 00:13:32 Duration
Lecture 6 Forwarding packets and restoring ARP tables 00:08:05 Duration
Lecture 7 Spoofing our IP address and sending message with TCP payload 00:12:01 Duration
Lecture 8 Running SynFlooder with changed source IP address 00:11:20 Duration
Lecture 9 Getting source and destination MAC address from received packets 00:24:46 Duration
Lecture 10 Sniffing FTP username and password part 1 00:08:09 Duration
Lecture 11 Sniffing FTP username and password part 2 00:12:09 Duration
Lecture 12 Getting passwords from HTTP websites 00:14:01 Duration

Section 6 : Coding DNS Spoofer

Lecture 1 Cloning any webpage 00:10:36 Duration
Lecture 2 Printing DNS queries 00:09:58 Duration
Lecture 3 Redirecting response to cloned page 00:16:45 Duration
Lecture 4 Setting IP table rules and running DNS spoofer 00:10:35 Duration

Section 7 : Network Analysis

Lecture 1 Analyzing Ethernet header 00:16:07 Duration
Lecture 2 Analyzing IP header part 1 00:10:25 Duration
Lecture 3 Analyzing IP header part 2 00:25:34 Duration
Lecture 4 Analyzing TCP header 00:15:13 Duration
Lecture 5 Analyzing UDP header 00:13:20 Duration

Section 8 : Multi-functioning Reverse Shell

Lecture 1 Theory behind socket programming
Lecture 2 Wine and Pyinstaller installation 00:07:41 Duration
Lecture 3 Setting up listener 00:08:18 Duration
Lecture 4 Establishing connection between target and server 00:06:31 Duration
Lecture 5 Implementing send & receive functions 00:11:28 Duration
Lecture 6 Executing commands on target system 00:11:43 Duration
Lecture 7 Importing JSON library to parse data 00:08:19 Duration
Lecture 8 Converting Python backdoor to 00:08:14 Duration
Lecture 9 Using OS library to change directory 00:09:58 Duration
Lecture 10 Downloading & uploading files to target PC 00:19:07 Duration
Lecture 11 Hiding our backdoor and creating persistence 00:13:49 Duration
Lecture 12 Trying to connect to server every 20 seconds 00:07:53 Duration
Lecture 13 Downloading files to target PC 00:11:49 Duration
Lecture 14 Capturing screenshot on target PC 00:23:05 Duration
Lecture 15 Administrator privilege check 00:08:14 Duration
Lecture 16 Starting other programs with our shell 00:10:44 Duration
Lecture 17 Running our shell as an image, audio, PDF 00:20:05 Duration

Section 9 : Coding a Keylogger

Lecture 1 Installing Pynput 00:06:20 Duration
Lecture 2 Printing space character
Lecture 3 Calling timer on our keylogger 00:09:56 Duration
Lecture 4 Adding keylogger to our backdoor 00:12:58 Duration

Section 10 : Command and Control Center

Lecture 1 What is a threaded server 00:05:06 Duration
Lecture 2 Accepting connections with a thread 00:13:12 Duration
Lecture 3 Managing multiple sessions 00:08:40 Duration
Lecture 4 Testing threaded server with Windows 10 target 00:09:04 Duration
Lecture 5 Fixing Q command 00:11:11 Duration
Lecture 6 Coding exit function 00:13:51 Duration
Lecture 7 Attacking multiple targets and gathering botnet 00:16:27 Duration

Section 11 : Website Penetration Testing

Lecture 1 Stealing saved wireless passwords 00:21:56 Duration
Lecture 2 Saving passwords to a file 00:03:02 Duration
Lecture 3 Bruteforcing Gmail 00:10:13 Duration
Lecture 4 Bruteforcing any login page part 1 00:13:00 Duration
Lecture 5 Bruteforcing any login page part 2 00:10:07 Duration
Lecture 6 Finding hidden directories part 1
Lecture 7 Finding hidden directories part 2 00:06:36 Duration
Lecture 8 Discovering subdomains 00:11:32 Duration
Lecture 9 Changing HTTP headers 00:13:56 Duration
Lecture 10 Starting basic and digest authentication bruteforcer 00:10:23 Duration
Lecture 11 Controlling threads 00:08:35 Duration
Lecture 12 Coding run function 00:10:06 Duration
Lecture 13 Printing usage and testing our program 00:12:33 Duration
Lecture 14 Taking a look at ransomware 00:08:20 Duration