Section 1 : Introduction and Setup

Lecture 1 Welcome to Python for ethical hacking! 5:16
Lecture 2 VirtualBox installation 11:39
Lecture 3 Kali Linux installation 17:6
Lecture 4 Adding Guest Additions 15:7
Lecture 5 Python in Kali terminal 13:32

Section 2 : Port and Vulnerability Scanning

Lecture 6 Coding a simple port scanner 15:30
Lecture 7 Adding raw_input to our port scanner 9:21
Lecture 8 Scanning the first 1,000 ports 4:46
Lecture 9 Coding an advanced port scanner part 1
Lecture 10 Coding an advanced port scanner part 2 8:48
Lecture 11 Finishing and testing our scanner 8:55
Lecture 12 Configuring IP address and installing Metasploitable 8:14
Lecture 13 Returning banner from open port 14:45
Lecture 14 Coding a vulnerability scanner part 1 11:55
Lecture 15 Coding a vulnerability scanner part 2 7:20

Section 3 : SSH and FTP Attacks

Lecture 16 Automating SSH login part 1 9:55
Lecture 17 Automating SSH login part 2 9:20
Lecture 18 Testing our SSH login program 8:34
Lecture 19 Coding a SSH brute-forcer 10:37
Lecture 20 Executing commands on target after brute-forcing SSH 10:10
Lecture 21 Anonymous FTP login attack 9:53
Lecture 22 Username & password list attack on FTP

Section 4 : Password Cracking

Lecture 23 SHA256, SHA512, MD5 8:37
Lecture 24 Cracking SHA1 hash with online dictionary 16:41
Lecture 25 Getting password from MD5 hash 13:23
Lecture 26 Cracking crypt passwords with salt 24:2

Section 5 : Sniffers, Flooders and Spoofers

Lecture 27 Changing MAC address manually 8:34
Lecture 28 Coding MAC address changer 16:56
Lecture 29 Theory behind ARP spoofing 4:42
Lecture 30 Crafting malicious ARP packet 19:26
Lecture 31 Coding ARP spoofer 13:32
Lecture 32 Forwarding packets and restoring ARP tables 8:5
Lecture 33 Spoofing our IP address and sending message with TCP payload 12:1
Lecture 34 Running SynFlooder with changed source IP address 11:20
Lecture 35 Getting source and destination MAC address from received packets 24:46
Lecture 36 Sniffing FTP username and password part 1 8:9
Lecture 37 Sniffing FTP username and password part 2 12:9
Lecture 38 Getting passwords from HTTP websites 14:1

Section 6 : Coding DNS Spoofer

Lecture 39 Cloning any webpage 10:36
Lecture 40 Printing DNS queries 9:58
Lecture 41 Redirecting response to cloned page 16:45
Lecture 42 Setting IP table rules and running DNS spoofer 10:35

Section 7 : Network Analysis

Lecture 43 Analyzing Ethernet header 16:7
Lecture 44 Analyzing IP header part 1 10:25
Lecture 45 Analyzing IP header part 2 25:34
Lecture 46 Analyzing TCP header 15:13
Lecture 47 Analyzing UDP header 13:20

Section 8 : Multi-functioning Reverse Shell

Lecture 48 Theory behind socket programming
Lecture 49 Wine and Pyinstaller installation 7:41
Lecture 50 Setting up listener 8:18
Lecture 51 Establishing connection between target and server 6:31
Lecture 52 Implementing send & receive functions 11:28
Lecture 53 Executing commands on target system 11:43
Lecture 54 Importing JSON library to parse data 8:19
Lecture 55 Converting Python backdoor to 8:14
Lecture 56 Using OS library to change directory 9:58
Lecture 57 Downloading & uploading files to target PC 19:7
Lecture 58 Hiding our backdoor and creating persistence 13:49
Lecture 59 Trying to connect to server every 20 seconds 7:53
Lecture 60 Downloading files to target PC 11:49
Lecture 61 Capturing screenshot on target PC 23:5
Lecture 62 Administrator privilege check 8:14
Lecture 63 Starting other programs with our shell 10:44
Lecture 64 Running our shell as an image, audio, PDF 20:5

Section 9 : Coding a Keylogger

Lecture 65 Installing Pynput 6:20
Lecture 66 Printing space character
Lecture 67 Calling timer on our keylogger 9:56
Lecture 68 Adding keylogger to our backdoor 12:58

Section 10 : Command and Control Center

Lecture 69 What is a threaded server 5:6
Lecture 70 Accepting connections with a thread 13:12
Lecture 71 Managing multiple sessions 8:40
Lecture 72 Testing threaded server with Windows 10 target 9:4
Lecture 73 Fixing Q command 11:11
Lecture 74 Coding exit function 13:51
Lecture 75 Attacking multiple targets and gathering botnet 16:27

Section 11 : Website Penetration Testing

Lecture 76 Stealing saved wireless passwords 21:56
Lecture 77 Saving passwords to a file 3:2
Lecture 78 Bruteforcing Gmail 10:13
Lecture 79 Bruteforcing any login page part 1 13:0
Lecture 80 Bruteforcing any login page part 2 10:7
Lecture 81 Finding hidden directories part 1
Lecture 82 Finding hidden directories part 2 6:36
Lecture 83 Discovering subdomains 11:32
Lecture 84 Changing HTTP headers 13:56
Lecture 85 Starting basic and digest authentication bruteforcer 10:23
Lecture 86 Controlling threads 8:35
Lecture 87 Coding run function 10:6
Lecture 88 Printing usage and testing our program 12:33
Lecture 89 Taking a look at ransomware 8:20