Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security: Ethical Hacking Using Python
Introduction to Python for ethical hacking!
Welcome to Python for ethical hacking! (5:16)
VirtualBox 6.0.4 installation (11:41)
Kali Linux 2019.1a installation (17:07)
Guest additions installation (15:08)
Python in Kali terminal (13:33)
Port and vulnerability scanning
Making simple port scanner (15:33)
Adding raw_input to our port scanner (9:24)
Scanning first 1000 ports (4:47)
Coding advance port scanner - part 1 (13:13)
Coding advance port scanner - part 2 (8:51)
Finishing and testing advance port scanner (9:00)
Configuring IP address and installing Metasploitable (8:14)
Returning banner from open port (14:46)
Coding vulnerability scanner - part 1 (11:57)
Coding vulnerability scanner - part 2 (7:21)
SSH & FTP attacks
Automating SSH login - part 1 (9:55)
Automating SSH login - part 2 (9:21)
Testing SSH login program (8:37)
Coding SSH Bruteforcer (10:38)
Executing command on target after brute forcing SSH (10:11)
Anonymous FTP login attack (9:55)
Username & password list attack on FTP (17:32)
Password cracking
SHA256, SHA512 and MD5 (8:37)
Cracking SHA1 hash with online dictionary (16:41)
Getting password from MD5 hash (13:26)
Cracking crypt password with Salt (24:02)
Sniffers, flooders, and spoofers
Changing MAC address manually (8:35)
Coding MAC changer (17:00)
Theory behind ARP spoofing (4:43)
Crafting malicious ARP packet (19:28)
Coding ARP spoofer (13:33)
Forwarding packets and restoring ARP tables (8:07)
Spoofing our IP address and sending message with TCP payload (12:02)
Running SynFlooder with changed source IP address (11:22)
Getting source and destination MAC address from received packets (24:46)
Sniffing FTP username and password - part 1 (8:12)
Sniffing FTP username and password - part 2 (12:12)
Getting passwords from HTTP websites (14:04)
Coding DNS spoofer
Cloning any webpage (10:37)
Printing DNS queries (10:01)
Redirecting response to cloned page (16:48)
Setting IP table rules and running DNS spoofer (10:40)
Network analysis
Analyzing Ethernet header (16:10)
Analyzing IP header - part 1 (10:27)
Analyzing IP header - part 2 (25:35)
Analyzing TCP header (15:15)
Analyzing UDP header (13:21)
Multi functioning reverse shell
Theory behind socket programming (7:20)
Wine & Pyinstaller installation (7:45)
Setting up listener (8:19)
Establishing connection between target and server (6:32)
Implementing send & recv functions (11:30)
Executing commands on target system (11:44)
Importing JSON library to parse data (8:21)
Converting Python backdoor to .exe (8:15)
Using OS library to change directory (10:00)
Downloading & uploading files to target PC (19:07)
Hiding our backdoor and creating persistence (13:50)
Trying to connect to server every 20 seconds (7:55)
Downloading files to target PC (11:51)
Capturing screenshot on target PC (23:08)
Administrator privilege check (8:15)
Starting other programs with our shell (10:47)
Running our shell as an image, audio, Pdf... (20:09)
Coding keylogger
Installing Pynput (6:21)
Printing space character (8:50)
Calling timer on our keylogger (9:58)
Adding keylogger to our backdoor (13:00)
Command and control center
What is a threaded server (5:07)
Accepting connections with a thread (13:14)
Managing multiple sessions (8:41)
Testing threaded server with Windows 10 target (9:05)
Fixing Q command (11:14)
Coding exit function (13:53)
Attacking multiple targets and gathering botnet (16:29)
Website penetration testing with Python
Stealing saved wireless passwords (22:00)
Saving passwords to a file (3:03)
Bruteforcing Gmail (10:15)
Bruteforcing any login page - part 1 (13:01)
Bruteforcing any login page - part 2 (10:11)
Finding hidden directories - part 1 (5:12)
Finding hidden directories - part 2 (6:40)
Discovering subdomains (11:33)
Changing HTTP headers (14:00)
Starting basic and digest authentication bruteforcer (10:25)
Controlling threads (8:37)
Coding run function (10:10)
Printing usage and testing our program (12:38)
Taking a look at ransomware (8:22)
Welcome to Python for ethical hacking!
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock