Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Python Hacking Course: Beginner to Advanced
Introduction and Setup
Welcome to Python for ethical hacking! (5:16)
VirtualBox installation (11:39)
Kali Linux installation (17:05)
Guest Additions installation (15:06)
Python in Kali terminal (13:31)
Port and Vulnerability Scanning
Building a simple port scanner (15:30)
Adding raw_input to our port scanner (9:21)
Scanning the first 1000 ports (4:46)
Coding an advanced port scanner part 1 (13:12)
Coding an advanced port scanner part 2 (8:48)
Finishing and testing our scanner (8:55)
Configuring IP address and installing Metasploitable (8:13)
Returning banner from open port (14:45)
Coding a vulnerability scanner part 1 (11:55)
Coding a vulnerability scanner part 2 (7:19)
SSH and FTP Attacks
Automating SSH login part 1 (9:54)
Automating SSH login part 2 (9:20)
Testing our SSH login program (8:34)
Coding SSH brute-forcer (10:37)
Executing commands on target after brute-forcing SSH (10:09)
Anonymous FTP login attack (9:53)
Username and password list attack on FTP (17:32)
Password Cracking
SHA256, SHA512, MD5 (8:37)
Cracking SHA1 hash with online dictionary (16:40)
Getting password from MD5 hash (13:22)
Cracking crypt passwords with salt (24:02)
Sniffers, Flooders and Spoofers
Changing MAC address manually (8:34)
Theory behind ARP spoofing (4:42)
Coding MAC address changer (16:56)
Crafting malicious ARP packet (19:26)
Coding ARP spoofer (13:31)
Forwarding packets and restoring ARP tables (8:04)
Spoofing our IP address and sending message with TCP payload (12:01)
Running SynFlooder with changed source IP address (11:20)
Getting source and destination MAC address from received packets (24:45)
Sniffing FTP username and password part 1 (8:09)
Sniffing FTP username and password part 2 (12:09)
Getting passwords from HTTP websites (14:01)
Coding DNS Spoofer
Cloning any web page (10:36)
Printing DNS queries (9:57)
Redirecting response to cloned page (16:44)
Setting IP table rules and running DNS spoofer (10:35)
Network Analysis
Analyzing Ethernet header (16:07)
Analyzing IP header part 1 (10:24)
Analyzing IP header part 2 (25:34)
Analyzing TCP header (15:13)
Analyzing UDP header (13:20)
Multi-functioning Reverse Shell
Theory behind socket programming (7:20)
Wine and Pyinstaller installation (7:41)
Setting up listener (8:17)
Establishing connection between target and server (6:31)
Implementing send & receive functions (11:28)
Executing commands on target system (11:43)
Importing JSON library to parse data (8:19)
Converting Python backdoor to .exe (8:14)
Using OS library to change directory (9:58)
Downloading & uploading files to target PC (19:07)
Hiding our backdoor and creating persistence (13:49)
Trying to connect to server every 20 seconds (7:52)
Downloading files to target PC (11:49)
Capturing screenshot on target PC (23:04)
Administrator privilege check (8:14)
Starting other programs with our shell (10:44)
Running our shell as an image, audio, PDF (20:05)
Coding a Keylogger
Installing Pynput (6:19)
Printing space character (8:48)
Calling timer on our keylogger (9:56)
Adding keylogger to our backdoor (12:58)
Command and Control Center
What is a threaded server? (5:05)
Accepting connections with a thread (13:11)
Managing multiple sessions (8:39)
Testing threaded server with Windows 10 target (9:04)
Fixing Q command (11:11)
Coding exit function (13:51)
Attacking multiple targets and gathering botnet (16:26)
Website Penetration Testing
Stealing saved wireless passwords (21:55)
Saving passwords to a file (3:02)
Bruteforcing Gmail (10:13)
Bruteforcing any login page part 1 (12:59)
Bruteforcing any login page part 2 (10:07)
Finding hidden directories part 1 (5:10)
Finding hidden directories part 2 (6:36)
Discovering subdomains (11:32)
Changing HTTP headers (13:56)
Starting basic and digest authentication bruteforcer (10:23)
Controlling threads (8:35)
Coding run function (10:06)
Printing usage and testing our program (12:33)
Taking a look at ransomware (8:20)
Python in Kali terminal
Download
Complete and Continue