| Introduction and Setup | |||
| Introduction to Python for Ethical Hacking | 00:05:00 | ||
| VirtualBox Installation | 00:12:00 | ||
| Kali Linux Installation | 00:17:00 | ||
| Guest Additions Installation | 00:15:00 | ||
| Python in Kali Terminal | 00:14:00 | ||
| Port and Vulnerability Scanning | |||
| Building a Simple Portscanner | 00:16:00 | ||
| Adding Raw Input to our Port Scanner | 00:09:00 | ||
| Scanning the First 1000 Ports | 00:05:00 | ||
| Coding an Advanced Port Scanner Part 1 | 00:13:00 | ||
| Coding an Advanced Port Scanner Part 2 | 00:09:00 | ||
| Finishing and Testing Our Scanner | 00:09:00 | ||
| Configuring IP Address and Installing Metasploitable | 00:00:00 | ||
| Returning Banner from Open Port | 00:15:00 | ||
| Coding a Vulnerability Scanner Part 1 | 00:12:00 | ||
| Coding a Vulnerability Scanner Part 2 | 00:07:00 | ||
| SSH and FTP Attacks | |||
| Automating SSH Login Part 1 | 00:10:00 | ||
| Automating SSH Login Part 2 | 00:09:00 | ||
| Testing Our SSH Login Program | 00:09:00 | ||
| Executing Commands on Target After Brute-forcing SSH | 00:10:00 | ||
| Anonymous FTP Login Attack | 00:10:00 | ||
| Username and Password List Attack on FTP | 00:18:00 | ||
| Password Cracking | |||
| SHA256, SHA512, MD5 | 00:09:00 | ||
| Cracking SHA1 Hash with Online Dictionary | 00:17:00 | ||
| Getting Password from MD5 Hash | 00:13:00 | ||
| Cracking Crypt Passwords with Salt | 00:24:00 | ||
| Sniffers, Flooders and Spoofers | |||
| Changing MAC Address Manually | 00:09:00 | ||
| Coding MAC Address Changer | 00:17:00 | ||
| Theory Behind ARP Spoofing | 00:05:00 | ||
| Crafting Malicious ARP Packet | 00:19:00 | ||
| Coding ARP Spoofer | 00:14:00 | ||
| Forwarding Packets and Restoring ARP Tables | 00:08:00 | ||
| Spoofing Our IP Address and Aending Message with TCP Payload | 00:12:00 | ||
| Running SynFlooder with Changed Source IP Address | 00:11:00 | ||
| Getting Source and Destination MAC Address from Received Packets | 00:25:00 | ||
| Sniffing FTP Username and Password Part 1 | 00:08:00 | ||
| Sniffing FTP Username and Password Part 2 | 00:12:00 | ||
| Getting Passwords from HTTP Websites | 00:14:00 | ||
| Coding DNS Spoofer | |||
| Cloning any Webpage | 00:11:00 | ||
| Printing DNS Queries | 00:10:00 | ||
| Redirecting Response to Cloned Page | 00:17:00 | ||
| Setting IP Table Rules and Running DNS Spoofer | 00:11:00 | ||
| Network Analysis | |||
| Analyzing Ethernet Header | 00:16:00 | ||
| Analyzing IP Header Part 1 | 00:10:00 | ||
| Analyzing IP Header Part 2 | 00:26:00 | ||
| Analyzing TCP Header | 00:15:00 | ||
| Analyzing UDP Header | 00:13:00 | ||
| Multi-functioning Reverse Shell | |||
| Theory Behind Socket Programming | 00:07:00 | ||
| Wine and Pyinstaller Installation | 00:08:00 | ||
| Setting up Listener | 00:08:00 | ||
| Establishing Connection between Target and Server | 00:07:00 | ||
| Implementing Send and Receive Functions | 00:11:00 | ||
| Executing Commands on Target System | 00:12:00 | ||
| Importing JSON Library to Parse Data | 00:08:00 | ||
| Converting Python Backdoor to .exe | 00:08:00 | ||
| Using OS Library to Change Directory | 00:10:00 | ||
| Downloading and Uploading Files to Target PC | 00:19:00 | ||
| Hiding Our Backdoor and Creating Persistence | 00:14:00 | ||
| Trying to Connect to Server Every 20 Seconds | 00:08:00 | ||
| Downloading Files to Target PC | 00:12:00 | ||
| Capturing Screenshot on Target PC | 00:23:00 | ||
| Administrator Privilege Check | 00:08:00 | ||
| Starting Other Programs with Our Shell | 00:11:00 | ||
| Running Our Shell as an Image, Audio, PDF | 00:20:00 | ||
| Coding a Keylogger | |||
| Installing Pynput | 00:06:00 | ||
| Printing Space Character | 00:09:00 | ||
| Calling Timer on Our Keylogger | 00:10:00 | ||
| Adding Keylogger to Our Backdoor | 00:13:00 | ||
| Command and Control Center | |||
| What is a Threaded Server | 00:05:00 | ||
| Accepting Connections with a Thread | 00:13:00 | ||
| Managing Multiple Sessions | 00:09:00 | ||
| Testing Threaded Server with Windows 10 Target | 00:09:00 | ||
| Coding Exit Function | 00:14:00 | ||
| Attacking Multiple Targets and Gathering Botnet | 00:16:00 | ||
| Website Penetration Testing | |||
| Stealing Saved Wireless Passwords | 00:22:00 | ||
| Saving Passwords to a File | 00:03:00 | ||
| Bruteforcing Gmail | 00:10:00 | ||
| Bruteforcing Any Login Page Part 1 | 00:13:00 | ||
| Bruteforcing Any Login Page Part 2 | 00:10:00 | ||
| Finding Hidden Directories Part 1 | 00:05:00 | ||
| Finding Hidden Directories Part 2 | 00:07:00 | ||
| Discovering Subdomains | 00:12:00 | ||
| Changing HTTP Headers | 00:14:00 | ||
| Starting Basic and Digest Authentication Bruteforcer | 00:10:00 | ||
| Controlling Threads | 00:09:00 | ||
| Coding Run Function | 00:10:00 | ||
| Printing Usage and Testing Our Program | 00:00:00 | ||
| Taking a Look at Ransomware | 00:08:00 | ||