Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools
Introduction to Python for ethical hacking!
Welcome to Python for ethical hacking! (5:16)
VirtualBox 6.0.4 installation (11:41)
Kali Linux 2019.1a installation (17:07)
Guest additions installation (15:08)
Python in Kali terminal (13:33)
Port and vulnerability scanning
Making simple port scanner (15:33)
Adding raw_input to our port scanner (9:24)
Scanning first 1000 ports (4:47)
Coding advance port scanner - part 1 (13:13)
Coding advance port scanner - part 2 (8:51)
Finishing and testing advance port scanner (9:00)
Configuring IP address and installing Metasploitable (8:14)
Returning banner from open port (14:46)
Coding vulnerability scanner - part 1 (11:57)
Coding vulnerability scanner - part 2 (7:21)
SSH & FTP attacks
Automating SSH login - part 1 (9:55)
Automating SSH login - part 2 (9:21)
Testing SSH login program (8:37)
Coding SSH Bruteforcer (10:38)
Executing command on target after brute forcing SSH (10:11)
Anonymous FTP login attack (9:55)
Username & password list attack on FTP (17:32)
Password cracking
SHA256, SHA512 and MD5 (8:37)
Cracking SHA1 hash with online dictionary (16:41)
Getting password from MD5 hash (13:26)
Cracking crypt password with Salt (24:02)
Sniffers, flooders, and spoofers
Changing MAC address manually (8:35)
Coding MAC changer (17:00)
Theory behind ARP spoofing (4:43)
Crafting malicious ARP packet (19:28)
Coding ARP spoofer (13:33)
Forwarding packets and restoring ARP tables (8:07)
Spoofing our IP address and sending message with TCP payload (12:02)
Running SynFlooder with changed source IP address (11:22)
Getting source and destination MAC address from received packets (24:46)
Sniffing FTP username and password - part 1 (8:12)
Sniffing FTP username and password - part 2 (12:12)
Getting passwords from HTTP websites (14:04)
Coding DNS spoofer
Cloning any webpage (10:37)
Printing DNS queries (10:01)
Redirecting response to cloned page (16:48)
Setting IP table rules and running DNS spoofer (10:40)
Network analysis
Analyzing Ethernet header (16:10)
Analyzing IP header - part 1 (10:27)
Analyzing IP header - part 2 (25:35)
Analyzing TCP header (15:15)
Analyzing UDP header (13:21)
Multi functioning reverse shell
Theory behind socket programming (7:20)
Wine & Pyinstaller installation (7:45)
Setting up listener (8:19)
Establishing connection between target and server (6:32)
Implementing send & recv functions (11:30)
Executing commands on target system (11:44)
Importing JSON library to parse data (8:21)
Converting Python backdoor to .exe (8:15)
Using OS library to change directory (10:00)
Downloading & uploading files to target PC (19:07)
Hiding our backdoor and creating persistence (13:50)
Trying to connect to server every 20 seconds (7:55)
Downloading files to target PC (11:51)
Capturing screenshot on target PC (23:08)
Administrator privilege check (8:15)
Starting other programs with our shell (10:47)
Running our shell as an image, audio, Pdf... (20:09)
Coding keylogger
Installing Pynput (6:21)
Printing space character (8:50)
Calling timer on our keylogger (9:58)
Adding keylogger to our backdoor (13:00)
Command and control center
What is a threaded server (5:07)
Accepting connections with a thread (13:14)
Managing multiple sessions (8:41)
Testing threaded server with Windows 10 target (9:05)
Fixing Q command (11:14)
Coding exit function (13:53)
Attacking multiple targets and gathering botnet (16:29)
Website penetration testing with Python
Saving passwords to a file (22:00)
Saving passwords to a file (3:03)
Bruteforcing Gmail (10:15)
Bruteforcing any login page - part 1 (13:01)
Bruteforcing any login page - part 2 (10:11)
Finding hidden directories - part 1 (5:12)
Finding hidden directories - part 2 (6:40)
Discovering subdomains (11:33)
Changing HTTP headers (14:00)
Starting basic and digest authentication bruteforcer (10:25)
Controlling threads (8:37)
Coding run function (10:10)
Printing usage and testing our program (12:38)
Taking a look at ransomware (8:22)
Getting source and destination MAC address from received packets
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock