Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hacking with Python - Learn to Create your own Hacking Tools
1.INTRODUCTION
1.Introduction (6:31)
2.Teaser-Section 1 (7:29)
3.What is programming_What is Hacking _ Why Learn Them (6:13)
4.Lab Over View _ Needed Software (5:41)
5.Installing Kali as a virtual Machine (8:31)
6.Basic Over View Of Kali Linux (5:10)
7.The Terminal _ Linux Commands (10:45)
8.Python2 Vs Python 3 _ Writing First Program (9:08)
9.Installing _ Using PuthonIDE (9:32)
10.Resource - 9.Installing _ Using PuthonIDE (9:32)
2.WRITING A MAC ADDRESS CHANGER - PYTHON BASICS
1.What is MAC Address _ How To Change it (9:08)
2.Resource - What is MAC Address _ How To Change it
3.Using Python Modules _ Executing System Commands (9:18)
4.Implementing a Very Basic Mac Changer (5:16)
5.Variables _ Strings (10:12)
6.Using Variabled in MAC Changer (4:36)
7.Getting Input From The User (6:18)
8.Handling User Input (9:40)
9.Handling Command-line Arguments (9:44)
10.Initialising Variables Based on Command-line Arguments (7:51)
11.Functions (9:40)
12.Returning Valus From Functions (6:55)
13.Decision Making - Theory (6:53)
14.Using Conditional Statements in MAC Changer (9:05)
3.MAC CHANGER - ALGORITHM DESIGN
1.What is an Algorithm (3:15)
2.Reading Outout Returned By System Command (6:24)
3.Regular Expressions_Regex_.mp4 (8:14)
4.Extracting a Substring Using Regex (6:39)
5.Refactoring _ Housekeeping (10:59)
6.Implementing The Algorithm to Check The Mac Did Change (6:11)
4.PROGRAMMING A NETWORK SCANNER
1.Introduction _ Teaser (10:11)
2.Installing Windows as a Virtual Maching (3:32)
3.What isARP _ What its Used For (9:43)
4.Designing an Algoithm To Discover Clients Connected To The Same Network (4:00)
5.Using Scapy To Create an ARP Request (6:48)
6.Combining Frames To BroadcastRequest (9:37)
7.Sending_Receiving Packets (6:57)
5.WRITING AN ARP SPOOFER
1.What is ARP Spoofing (6:20)
2.Redirecting the Flow of Packets in a Network Using arpspoof (5:08)
3.Creating an ARP Response (7:11)
4.Sending ARP Responses (5:34)
5.Extracting MAC Address From Responses (6:59)
6.Extracting MAC Address From Responses (8:53)
6.WRITING A PACKET SNIFFER
1.Introduction_Teaser (4:39)
2.Sniffing Packets Using Scapy (7:20)
3.Extracting data From a Specific Layer (6:50)
4.Analysing Sniffed Packets & Extracting Fields From Layers (12:21)
5.Analysing Fields & Extracting Passwords (0:42)
6.Extracting URLs (8:00)
7.Capturing Passwords From Any Computer Connected to the Same Network (8:03)
7.WRITING A DNS SPOOFER
1.Intercepting Packets - Creating a Proxy (13:00)
2.Converting Packets to Scapy Packets (9:21)
3.What is DNS Spoofing (7:20)
4.Filtering DNS Responses (6:26)
5.Analysing & Creating a Custom DNS Response (7:56)
6.Modifying Packets On The Fly (7:57)
7.Redirecting DNS Responses (5:45)
8.WRITING A FILE INTERCEPTOR
1.Introduction_Teaser (1:20)
2.Analysing HTTP Responses (6:49)
3.Replacing a Substring Using Regex (7:15)
4.Decoding HTTP Responses (9:48)
5.Modifying HTTP Responses & Injecting Javascript Code in HTML Pages (8:50)
6.Refactoring & Housekeeping (8:29)
7.Debugging Issues (6:01)
8.Using Groups_None-capturing Regex (8:57)
9.WRITING A CODE INJECTOR
1.Running Python Programs on Windows (9:45)
2.Capturing & Analysing ARP Responses (6:43)
3.Detecting ARP Spoofing Attacks (7:49)
10.WRITING AN ARP SPOOF DETECTOR
1.Running Python Programs on Windows (9:45)
2.Capturing & Analysing ARP Responses (6:43)
3.Detecting ARP Spoofing Attacks (7:49)
11.WRITING MALWARE
1.Introduction_Teaser (1:57)
2.Execute System Command Payload (9:40)
3.Sending Reports By Email (11:25)
4.Filtering Command Output Using Regex (10:07)
5.Stealing WiFi Passwords Saved on a Computer (9:34)
6.Downloading Files From Program (7:49)
7.Writing Files on Disk (11:24)
8.Password Recovery Basics (8:19)
9.Using all the Above to Steal Saved Passwords Remotely (8:03)
10.Interacting With The File System (9:43)
12.WRITING MALWARE - KEYLOGGER
1.Introduction_Teaser (3:41)
2.Writing a Basic Local Keylogger (9:59)
3.Global Variables (8:07)
4.Logging Special Keys (6:58)
5.Threading & Recursion (10:59)
6.OOP - Object Oriented Programming Basics (15:07)
7.Constructor Methods & Instance Variables (8:06)
8.Logging Key-strikes and Reporting Them By Email (11:58)
13.WRITING MALWARE - BACKDOORS
1.Introduction_Teaser (5:46)
2.Client - Server Communication_Connection Types (7:46)
3.Learn Python _ Ethical Hacking From Scratch (10:09)
4.Sending & Receiving Data Over TCP (5:19)
5.Executing System Commands Remotely (10:06)
6.Implementing a Server (9:08)
7.Implementing Skeleton For Server - Client Communication (6:58)
8.Refactoring - Creating a Listener Class (8:13)
9.Refactoring - Creating a Backdoor Class (6:23)
10.Serialisation - Theory (11:14)
14.WRITING MALWARE - PACKAGING
1.Introduction-Teaser (3:15)
2.Converting Python Programs To Windows Binary Executables (7:12)
3.Running Executables Silentely (7:22)
4.Installing Windows Pyinstaller on Linux (7:43)
5.Packaging Programs For Windows From Linux (8:33)
6.Persistence Idea (8:15)
7.Running Programs on Startup (14:43)
8.Creating a Basic Trojan Using Download & Execute Payload (10:36)
9.Creating a Trojan By Embedding Files In Program Code (8:33)
10.Bypassing Anti-Virus Programs - Theory (5:22)
15.WEBSITE WEB APPLICATION HACKING
1.Introduction-Teaser (6:42)
2.What is a Website (4:13)
3.How to Hack a Website (5:31)
4.Sending GET Requests To Web Servers (10:00)
5.Discovering Subdomains (11:43)
6.Discovering Hidden Paths in Websites (10:54)
7.Reading Response Content (6:26)
8.Extracting Useful Data From Response (7:08)
9.Filtering Rsults (7:10)
10.Extracting Unique Links & Storing Them In a List (6:42)
11.Recursively Discovering All Paths On a Target Website (9:37)
16.WRITING A PROGRAM TO GUESS LOGIN INFORMATION
1.Sending Post Requests to Websites (11:59)
2.Guessing Login Information on Login Pages (9:05)
17.WRITING A VULNERABILITY SCANNER
1.Introduction-Teaser (2:35)
2.HTTP Requests - POST VS GET (7:05)
3.Parsing HTML Code (8:19)
4.Extracting HTML Attributes (10:30)
5.Posting Forms (10:27)
6.Building Basic Structure For Vulnerability Scanner (11:24)
7.Using Default Parameters (5:08)
8.Sending Requests in a Session (9:16)
9.Extracting & Submitting Forms Automatically (10:06)
10.Implementing a Method To Run The Scanner (6:08)
11.Discovering XSS Vulnerabilities (9:07)
12.Exploiting XSS Vulnerabilities (5:08)
13.Implementing Code To Discover XSS in Forms (8:15)
14.Implementing Code To Discover XSS in Parameters (7:43)
15.Automatically Discovering Vulnerabilities Using the Vulnerability Scanner (8:46)
Teach online with
6.Modifying Packets On The Fly
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock