This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mastering in Python Programming For Hacking From Scratch
1. INTRODUCTION
1.Introduction (6:31)
2.Teaser (7:29)
3.What is programming_What is Hacking _ Why Learn Them (6:13)
4.Lab Over View _ Needed Software (5:41)
5. Installing Kali as a virtual Machine (8:31)
7.The Terminal _ Linux Commands (10:45)
6.Basic Over View Of Kali Linux (5:10)
8.Python2 Vs Python 3 _ Writing First Program (9:08)
9.Installing _ Using PuthonIDE (9:32)
10 - What is MAC Address _ How To Change it (9:08)
11-Using Python Modules _ Executing System Commands (9:18)
12.Implementing a Very Basic Mac Changer (5:16)
13.Variables _ Strings (10:12)
14.Using Variabled in MAC Changer (4:36)
15.Getting Input From The User (6:18)
16.Handling User Input (9:40)
17. Handling Command-line Arguments (9:44)
18. Initialising Variables Based on Command-line Arguments (7:51)
19.Functions (9:40)
20.Returning Valus From Functions (6:55)
21.Decision Making - Theory (6:53)
22.Using Conditional Statements in MAC Changer (9:05)
2.WRITING A MAC ADDRESS CHANGER - PYTHON BASICS
23.What is an Algorithm (3:15)
24.Reading Outout Returned By System Command (6:24)
25.Regular Expressions_Regex_ (8:14)
26.Extracting a Substring Using Regex (6:39)
27.Refactoring _ Housekeeping (10:59)
28.Implementing The Algorithm to Check The Mac Did Change (6:11)
3.PROGRAMMING A NETWORK SCANNER
29.Introduction _ Teaser (10:11)
30.Installing Windows as a Virtual Machine (3:32)
31.What isARP _ What its Used For (9:43)
32.Designing an Algoithm To Discover Clients Connected To The Same (4:00)
4.Network
33.Using Scapy To Create an ARP Request (6:48)
34. Combining Frames To BroadcastRequest (9:37)
35. Sending & Receiving Packets (6:57)
36. Lists (8:20)
37. Iterating Over Lists & Analysing Packet (10:09)
38. Using Escape Characters To Enhance Program Output (6:29)
39. Dictionaries (9:37)
40. Improving the Program Using a List of Dictionaries (8:55)
41. Iterating Over Nested Data Structures (7:18)
42. Python 3 Compatibility (6:55)
5.WRITING AN ARP SPOOFER
43.What is ARP Spoofing (6:20)
44. Redirecting the Flow of Packets in a Network Using arpspoof (5:08)
45. Creating an ARP Response (7:11)
46.Sending ARP Responses (5:34)
47. Extracting MAC Address From Responses (6:59)
48. Loops (8:53)
49. More on Loops & Counters (7:56)
50. Dynamic Printing (6:54)
51. Handling Exceptions (5:16)
52. Implementing a Restore Function (11:55)
53. Restoring ARP Tables When an Exception Occures (5:33)
6.WRITING A PACKET SNIFFER
54. Introduction & Teaser (4:39)
55. Sniffing Packets Using Scapy (7:20)
56. Extracting data From a Specific Layer (6:50)
57. Analysing Sniffed Packets & Extracting Fields From Layers (12:21)
58. Analysing Fields & Extracting Passwords (0:42)
59. Extracting URLs (8:00)
60.Capturing Passwords From Any Computer Connected to the Same (8:03)
7.WRITING A DNS SPOOFER
61. Intercepting Packets - Creating a Proxy (13:00)
62. Converting Packets to Scapy Packets (9:21)
63. What is DNS Spoofing (7:20)
64. Filtering DNS Responses (6:26)
65. Analysing & Creating a Custom DNS Response (7:56)
66. Modifying Packets On The Fly (7:57)
67. Redirecting DNS Responses (5:45)
8.WRITING A FILE INTERCEPTOR
68. Introduction & Teaser (6:08)
69. Filtering Traffic Based on the Port Used (9:22)
70. Analysing HTTP Requests (5:54)
71. Intercepting HTTP Requests (10:19)
72. Modifying HTTP Responses on The Fly (10:47)
73. Intercepting & Replacing Downloads on The Network (9:24)
9.WRITING A CODE INJECTOR
74. Introduction & Teaser (1:20)
75. Analysing HTTP Responses (6:49)
76. Replacing a Substring Using Regex (7:15)
77. Decoding HTTP Responses (9:48)
78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages (8:50)
79. Refactoring & Housekeeping (8:29)
80. Debugging Issues (6:01)
81. Using Groups & None-capturing Regex (8:57)
82. Recalculating Content Length (11:38)
83. BeEF Overview & Basic Hook Method (6:39)
84. Hooking Computers Using code_injector (5:37)
85. Basic BeEF Commands (4:24)
86. Delivering Malware Using BeEF (5:41)
87. How to Bypass HTTPS (10:49)
88. Bypassing HTTPS & Sniffing Login Credentials (8:04)
89. Replacing Downloads on HTTPS Pages (10:56)
90. Injecting Code in HTTPS Pages (8:35)
10.WRITING AN ARP SPOOF DETECTOR
91. Running Python Programs on Windows (9:45)
92.Capturing & Analysing ARP Responses (6:43)
93. Detecting ARP Spoofing Attacks (7:49)
11.WRITING MALWARE
94. Introduction & Teaser (1:57)
95. Execute System Command Payload (9:40)
96. Sending Reports By Email (11:25)
97. Filtering Command Output Using Regex (10:07)
98. Stealing WiFi Passwords Saved on a Computer (9:34)
99. Downloading Files From Program (7:49)
100. Writing Files on Disk (11:24)
101. Password Recovery Basics (8:19)
102. Using all the Above to Steal Saved Passwords Remotely (8:03)
103. Interacting With The File System (9:43)
12.WRITING MALWARE - KEYLOGGER
104. Introduction & Teaser (3:41)
105. Writing a Basic Local Keylogger (9:59)
106. Global Variables (8:07)
107. Logging Special Keys (6:58)
108. Threading & Recursion (10:59)
109. OOP - Object Oriented Programming Basics (15:07)
110. Constructor Methods & Instance Variables (8:06)
111. Logging Key-strikes and Reporting Them By Email (11:58)
13.WRITING MALWARE - BACKDOORS
112. Introduction & Teaser (5:46)
113. Client - Server Communication & Connection Types (7:46)
114.Learn Python _ Ethical Hacking From Scratch (10:09)
115. Sending & Receiving Data Over TCP (5:19)
116. Executing System Commands Remotely (10:06)
117. Implementing a Server (9:08)
118. Implementing Skeleton For Server - Client Communication (6:58)
119. Refactoring - Creating a Listener Class (8:13)
120. Refactoring - Creating a Backdoor Class (6:23)
121. Serialisation - Theory (11:14)
122. Serialisation - Implementing Reliable Methods (7:55)
123. Serialisation - Reliably Sending & Receiving Data (6:20)
124. Sending Commands as List & Implementing Exit Command (8:16)
125. Interacting With the File System - Implementing cd Command (9:24)
126. Reading Files (7:30)
127. Writing Files (6:52)
128. Downloading Files From Hacked Computer (7:54)
129. Implementing Upload Functionality in Listener (7:53)
130. Implementing Upload Functionality in Backdoor (6:12)
131. Handling Unknown Exceptions (9:37)
132. Using the Backdoor to Hack Windows, Linux & OS X (4:18)
14.WRITING MALWARE - PACKAGING
133. Introduction & Teaser (3:15)
134. Converting Python Programs To Windows Binary Executables (7:12)
135. Running Executables Silentely (7:22)
136. Installing Windows Pyinstaller on Linux (7:43)
137. Packaging Programs For Windows From Linux (8:33)
138. Persistence Idea (8:15)
139. Running Programs on Startup (14:43)
140. Creating a Basic Trojan Using Download & Execute Payload (10:36)
141. Creating a Trojan By Embedding Files In Program Code (8:33)
142. Bypassing Anti-Virus Programs - Theory (5:22)
143. Bypassing Anti-Virus Programs - Practical (9:04)
144. Adding an Icon to Generated Executables (5:14)
145. Spoofing File Extension (9:35)
146. Converting Python Programs To OS X Executables (8:41)
147. Converting Python Programs to Linux Executables (7:23)
15.WEBSITE WEB APPLICATION HACKING
148. Introduction & Teaser (6:42)
149. What is a Website (4:13)
150. How to Hack a Website (5:31)
151. Sending GET Requests To Web Servers (10:00)
152. Discovering Subdomains (11:43)
153. Discovering Hidden Paths in Websites (10:54)
154. Reading Response Content (6:26)
155. Extracting Useful Data From Response (7:08)
156. Filtering Rsults (7:10)
157. Extracting Unique Links & Storing Them In a List (6:42)
158. Recursively Discovering All Paths On a Target Website (9:37)
16.WRITING A PROGRAM TO GUESS LOGIN INFORMATION
159. Sending Post Requests to Websites (11:59)
160. Guessing Login Information on Login Pages (9:05)
17.WRITING A VULNERABILITY SCANNER
161. Introduction & Teaser (2:35)
162. HTTP Requests - POST VS GET (7:05)
163. Parsing HTML Code (8:19)
164. Extracting HTML Attributes (10:30)
165. Posting Forms (10:27)
166. Building Basic Structure For Vulnerability Scanner (11:24)
167. Using Default Parameters (5:08)
168. Sending Requests in a Session (9:16)
169. Extracting & Submitting Forms Automatically (10:06)
170. Implementing a Method To Run The Scanner (6:08)
171. Discovering XSS Vulnerabilities (9:07)
172. Exploiting XSS Vulnerabilities (5:08)
173. Implementing Code To Discover XSS in Forms (8:15)
174. Implementing Code To Discover XSS in Parameters (7:43)
175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner (8:46)
2.Teaser
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock