| Module: 01 | |||
| 1.1 Introduction to Python for Ethical Hacking | 00:05:00 | ||
| 1.2 VirtualBox Installation | 00:12:00 | ||
| 1.3 Kali Linux Installation | 00:17:00 | ||
| 1.4 Guest Additions Installation | 00:15:00 | ||
| 1.5 Python in Kali Terminal | 00:14:00 | ||
| Module: 02 | |||
| 2.1 Building a Simple Portscanner | 00:16:00 | ||
| 2.2 Adding Raw Input to Our Port Scanner | 00:09:00 | ||
| 2.3 Scanning the First 1000 Ports | 00:05:00 | ||
| 2.4 Coding an Advanced Port Scanner Part 1 | 00:13:00 | ||
| 2.5 Coding an Advanced Port Scanner Part 2 | 00:09:00 | ||
| 2.6 Finishing and Testing Our Scanner | 00:09:00 | ||
| 2.7 Configuring IP Address and Installing Metasploitable | 00:08:00 | ||
| 2.8 Returning Banner from Open Port | 00:15:00 | ||
| 2.9 Coding a Vulnerability Scanner Part 1 | 00:12:00 | ||
| Module: 03 | |||
| 3.1 Automating SSH Login Part 1 | 00:10:00 | ||
| 3.2 Automating SSH Login Part 2 | 00:10:00 | ||
| 3.3 Testing Our SSH Login Program | 00:09:00 | ||
| 3.4 Coding SSH Brute-forcer | 00:11:00 | ||
| 3.5 Executing Commands on Target After Brute-forcing SSH | 00:10:00 | ||
| 3.6 Anonymous FTP Login Attack | 00:10:00 | ||
| 3.7 Username and Password List Attack on FTP | 00:18:00 | ||
| Module: 04 | |||
| 4.1 SHA256, SHA512, MD5 | 00:09:00 | ||
| 4.2 Cracking SHA1 Hash with Online Dictionary | 00:17:00 | ||
| 4.3 Getting Password from MD5 Hash | 00:13:00 | ||
| 4.4 Cracking Crypt Passwords with Salt | 00:24:00 | ||
| Module: 05 | |||
| 5.1 Changing MAC Address Manually | 00:08:00 | ||
| 5.2 Coding MAC Address Changer | 00:17:00 | ||
| 5.3 Theory Behind ARP Spoofing | 00:05:00 | ||
| 5.4 Crafting Malicious ARP Packet | 00:19:00 | ||
| 5.5 Coding ARP Spoofer | 00:14:00 | ||
| 5.6 Forwarding Packets and Restoring ARP Tables | 00:08:00 | ||
| 5.7 Spoofing Our IP Address and Sending Message with TCP Payload | 00:12:00 | ||
| 5.8 Running SynFlooder with Changed Source IP Address | 00:11:00 | ||
| 5.9 Getting Source and Destination MAC Address from Received Packets | 00:25:00 | ||
| 5.10 Sniffing FTP Username and Password Part 1 | 00:06:00 | ||
| 5.11 Sniffing FTP Username and Password Part 2 | 00:12:00 | ||
| 5.12 Getting Passwords from HTTP Websites | 00:14:00 | ||
| Module: 06 | |||
| 6.1 Cloning Any Webpage | 00:11:00 | ||
| 6.2 Printing DNS Queries | 00:10:00 | ||
| 6.3 Redirecting Response to Cloned Page | 00:17:00 | ||
| 6.4 Setting IP Table Rules and Running DNS Spoofer | 00:11:00 | ||
| Module: 07 | |||
| 7.1 Analyzing Ethernet Header | 00:16:00 | ||
| 7.2 Analyzing IP Header Part 1 | 00:10:00 | ||
| 7.3 Analyzing IP Header Part 2 | 00:26:00 | ||
| 7.4 Analyzing TCP Header | 00:15:00 | ||
| 7.5 Analyzing UDP Header | 00:13:00 | ||
| Module: 08 | |||
| 8.1 Theory Behind Socket Programming | 00:07:00 | ||
| 8.2 Wine and Pyinstaller Installation | 00:08:00 | ||
| 8.3 Setting up Listener | 00:08:00 | ||
| 8.4 Establishing Connection Between Target and Server | 00:07:00 | ||
| 8.5 Implementing Send and Receive Functions | 00:11:00 | ||
| 8.6 Executing Commands on Target System | 00:12:00 | ||
| 8.7 Importing JSON Library to Parse Data | 00:06:00 | ||
| 8.8 Converting Python Backdoor to exe | 00:08:00 | ||
| 8.9 Using OS Library to Change Directory | 00:10:00 | ||
| 8.10 Downloading and Uploading Files to Target PC | 00:19:00 | ||
| 8.11 Hiding Our Backdoor and Creating Persistence | 00:14:00 | ||
| 8.12 Trying to Connect to Server Every 20 Seconds | 00:08:00 | ||
| 8.13 Downloading Files to Target PC | 00:12:00 | ||
| 8.14 Capturing Screenshot on Target PC | 00:23:00 | ||
| 8.15 Administrator Privilege Check | 00:08:00 | ||
| 8.16 Starting Other Programs with Our Shell | 00:11:00 | ||
| 8.17 Running Our Shell as an Image, Audio, PDF | 00:20:00 | ||
| Module: 09 | |||
| 9.1 Installing Pynput | 00:06:00 | ||
| 9.2 Printing Space Character | 00:09:00 | ||
| 9.3 Calling Timer on Our Keylogger | 00:10:00 | ||
| 9.4 Adding Keylogger to Our Backdoor | 00:13:00 | ||
| Module: 10 | |||
| 10.1 What is a Threaded Server | 00:05:00 | ||
| 10.2 Accepting Connections with a Thread | 00:13:00 | ||
| 10.3 Managing Multiple Sessions | 00:07:00 | ||
| 10.4 Testing Threaded Server with Windows 10 Target | 00:09:00 | ||
| 10.5 Fixing Q Command | 00:11:00 | ||
| 10.6 Coding Exit Function | 00:14:00 | ||
| 10.7 Attacking Multiple Targets and Gathering Botnet | 00:16:00 | ||
| Module: 11 | |||
| 11.1 Stealing Saved Wireless Passwords | 00:22:00 | ||
| 11.2 Saving Passwords to a File | 00:03:00 | ||
| 11.3 Bruteforcing Gmail | 00:10:00 | ||
| 11.4 Bruteforcing Any Login Page Part 1 | 00:13:00 | ||
| 11.5 Bruteforcing Any Login Page Part 2 | 00:10:00 | ||
| 11.6 Finding Hidden Directories Part 1 | 00:05:00 | ||
| 11.7 Finding Hidden Directories Part 2 | 00:07:00 | ||
| 11.8 Discovering Subdomains | 00:12:00 | ||
| 11.9 Changing HTTP Headers | 00:14:00 | ||
| 11.10 Starting Basic and Digest Authentication Bruteforcer | 00:10:00 | ||
| 11.11 Controlling Threads | 00:09:00 | ||
| 11.12 Coding Run Function | 00:10:00 | ||
| 11.13 Printing Usage and Testing Our Program | 00:13:00 | ||
| 11.14 Taking a Look at Ransomware | 00:08:00 | ||