Section 1 : Introduction and Setup
|
Lecture 1 | Welcome to Python for ethical hacking! | 00:05:16 Duration |
|
Lecture 2 | VirtualBox installation | 00:11:39 Duration |
|
Lecture 3 | Kali Linux installation | 00:17:06 Duration |
|
Lecture 4 | Adding Guest Additions | 00:15:07 Duration |
|
Lecture 5 | Python in Kali terminal | 00:13:32 Duration |
Section 2 : Port and Vulnerability Scanning
|
Lecture 1 | Coding a simple port scanner | 00:15:30 Duration |
|
Lecture 2 | Adding raw_input to our port scanner | 00:09:21 Duration |
|
Lecture 3 | Scanning the first 1,000 ports | 00:04:46 Duration |
|
Lecture 4 | Coding an advanced port scanner part 1 | |
|
Lecture 5 | Coding an advanced port scanner part 2 | 00:08:48 Duration |
|
Lecture 6 | Finishing and testing our scanner | 00:08:55 Duration |
|
Lecture 7 | Configuring IP address and installing Metasploitable | 00:08:14 Duration |
|
Lecture 8 | Returning banner from open port | 00:14:45 Duration |
|
Lecture 9 | Coding a vulnerability scanner part 1 | 00:11:55 Duration |
|
Lecture 10 | Coding a vulnerability scanner part 2 | 00:07:20 Duration |
Section 3 : SSH and FTP Attacks
|
Lecture 1 | Automating SSH login part 1 | 00:09:55 Duration |
|
Lecture 2 | Automating SSH login part 2 | 00:09:20 Duration |
|
Lecture 3 | Testing our SSH login program | 00:08:34 Duration |
|
Lecture 4 | Coding a SSH brute-forcer | 00:10:37 Duration |
|
Lecture 5 | Executing commands on target after brute-forcing SSH | 00:10:10 Duration |
|
Lecture 6 | Anonymous FTP login attack | 00:09:53 Duration |
|
Lecture 7 | Username & password list attack on FTP |
Section 4 : Password Cracking
|
Lecture 1 | SHA256, SHA512, MD5 | 00:08:37 Duration |
|
Lecture 2 | Cracking SHA1 hash with online dictionary | 00:16:41 Duration |
|
Lecture 3 | Getting password from MD5 hash | 00:13:23 Duration |
|
Lecture 4 | Cracking crypt passwords with salt | 00:24:02 Duration |
Section 5 : Sniffers, Flooders and Spoofers
|
Lecture 1 | Changing MAC address manually | 00:08:34 Duration |
|
Lecture 2 | Coding MAC address changer | 00:16:56 Duration |
|
Lecture 3 | Theory behind ARP spoofing | 00:04:42 Duration |
|
Lecture 4 | Crafting malicious ARP packet | 00:19:26 Duration |
|
Lecture 5 | Coding ARP spoofer | 00:13:32 Duration |
|
Lecture 6 | Forwarding packets and restoring ARP tables | 00:08:05 Duration |
|
Lecture 7 | Spoofing our IP address and sending message with TCP payload | 00:12:01 Duration |
|
Lecture 8 | Running SynFlooder with changed source IP address | 00:11:20 Duration |
|
Lecture 9 | Getting source and destination MAC address from received packets | 00:24:46 Duration |
|
Lecture 10 | Sniffing FTP username and password part 1 | 00:08:09 Duration |
|
Lecture 11 | Sniffing FTP username and password part 2 | 00:12:09 Duration |
|
Lecture 12 | Getting passwords from HTTP websites | 00:14:01 Duration |
Section 6 : Coding DNS Spoofer
|
Lecture 1 | Cloning any webpage | 00:10:36 Duration |
|
Lecture 2 | Printing DNS queries | 00:09:58 Duration |
|
Lecture 3 | Redirecting response to cloned page | 00:16:45 Duration |
|
Lecture 4 | Setting IP table rules and running DNS spoofer | 00:10:35 Duration |
Section 7 : Network Analysis
|
Lecture 1 | Analyzing Ethernet header | 00:16:07 Duration |
|
Lecture 2 | Analyzing IP header part 1 | 00:10:25 Duration |
|
Lecture 3 | Analyzing IP header part 2 | 00:25:34 Duration |
|
Lecture 4 | Analyzing TCP header | 00:15:13 Duration |
|
Lecture 5 | Analyzing UDP header | 00:13:20 Duration |
Section 8 : Multi-functioning Reverse Shell
Section 9 : Coding a Keylogger
|
Lecture 1 | Installing Pynput | 00:06:20 Duration |
|
Lecture 2 | Printing space character | |
|
Lecture 3 | Calling timer on our keylogger | 00:09:56 Duration |
|
Lecture 4 | Adding keylogger to our backdoor | 00:12:58 Duration |
Section 10 : Command and Control Center
|
Lecture 1 | What is a threaded server | 00:05:06 Duration |
|
Lecture 2 | Accepting connections with a thread | 00:13:12 Duration |
|
Lecture 3 | Managing multiple sessions | 00:08:40 Duration |
|
Lecture 4 | Testing threaded server with Windows 10 target | 00:09:04 Duration |
|
Lecture 5 | Fixing Q command | 00:11:11 Duration |
|
Lecture 6 | Coding exit function | 00:13:51 Duration |
|
Lecture 7 | Attacking multiple targets and gathering botnet | 00:16:27 Duration |
Section 11 : Website Penetration Testing
|
Lecture 1 | Stealing saved wireless passwords | 00:21:56 Duration |
|
Lecture 2 | Saving passwords to a file | 00:03:02 Duration |
|
Lecture 3 | Bruteforcing Gmail | 00:10:13 Duration |
|
Lecture 4 | Bruteforcing any login page part 1 | 00:13:00 Duration |
|
Lecture 5 | Bruteforcing any login page part 2 | 00:10:07 Duration |
|
Lecture 6 | Finding hidden directories part 1 | |
|
Lecture 7 | Finding hidden directories part 2 | 00:06:36 Duration |
|
Lecture 8 | Discovering subdomains | 00:11:32 Duration |
|
Lecture 9 | Changing HTTP headers | 00:13:56 Duration |
|
Lecture 10 | Starting basic and digest authentication bruteforcer | 00:10:23 Duration |
|
Lecture 11 | Controlling threads | 00:08:35 Duration |
|
Lecture 12 | Coding run function | 00:10:06 Duration |
|
Lecture 13 | Printing usage and testing our program | 00:12:33 Duration |
|
Lecture 14 | Taking a look at ransomware | 00:08:20 Duration |