Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mastering in Python Programming For Hacking From Scratch
1. INTRODUCTION
1.Introduction (6:31)
2.Teaser (7:29)
3.What is programming_What is Hacking _ Why Learn Them (6:13)
4.Lab Over View _ Needed Software (5:41)
5. Installing Kali as a virtual Machine (8:31)
7.The Terminal _ Linux Commands (10:45)
6.Basic Over View Of Kali Linux (5:10)
8.Python2 Vs Python 3 _ Writing First Program (9:08)
9.Installing _ Using PuthonIDE (9:32)
10 - What is MAC Address _ How To Change it (9:08)
11-Using Python Modules _ Executing System Commands (9:18)
12.Implementing a Very Basic Mac Changer (5:16)
13.Variables _ Strings (10:12)
14.Using Variabled in MAC Changer (4:36)
15.Getting Input From The User (6:18)
16.Handling User Input (9:40)
17. Handling Command-line Arguments (9:44)
18. Initialising Variables Based on Command-line Arguments (7:51)
19.Functions (9:40)
20.Returning Valus From Functions (6:55)
21.Decision Making - Theory (6:53)
22.Using Conditional Statements in MAC Changer (9:05)
2.WRITING A MAC ADDRESS CHANGER - PYTHON BASICS
23.What is an Algorithm (3:15)
24.Reading Outout Returned By System Command (6:24)
25.Regular Expressions_Regex_ (8:14)
26.Extracting a Substring Using Regex (6:39)
27.Refactoring _ Housekeeping (10:59)
28.Implementing The Algorithm to Check The Mac Did Change (6:11)
3.PROGRAMMING A NETWORK SCANNER
29.Introduction _ Teaser (10:11)
30.Installing Windows as a Virtual Machine (3:32)
31.What isARP _ What its Used For (9:43)
32.Designing an Algoithm To Discover Clients Connected To The Same (4:00)
4.Network
33.Using Scapy To Create an ARP Request (6:48)
34. Combining Frames To BroadcastRequest (9:37)
35. Sending & Receiving Packets (6:57)
36. Lists (8:20)
37. Iterating Over Lists & Analysing Packet (10:09)
38. Using Escape Characters To Enhance Program Output (6:29)
39. Dictionaries (9:37)
40. Improving the Program Using a List of Dictionaries (8:55)
41. Iterating Over Nested Data Structures (7:18)
42. Python 3 Compatibility (6:55)
5.WRITING AN ARP SPOOFER
43.What is ARP Spoofing (6:20)
44. Redirecting the Flow of Packets in a Network Using arpspoof (5:08)
45. Creating an ARP Response (7:11)
46.Sending ARP Responses (5:34)
47. Extracting MAC Address From Responses (6:59)
48. Loops (8:53)
49. More on Loops & Counters (7:56)
50. Dynamic Printing (6:54)
51. Handling Exceptions (5:16)
52. Implementing a Restore Function (11:55)
53. Restoring ARP Tables When an Exception Occures (5:33)
6.WRITING A PACKET SNIFFER
54. Introduction & Teaser (4:39)
55. Sniffing Packets Using Scapy (7:20)
56. Extracting data From a Specific Layer (6:50)
57. Analysing Sniffed Packets & Extracting Fields From Layers (12:21)
58. Analysing Fields & Extracting Passwords (0:42)
59. Extracting URLs (8:00)
60.Capturing Passwords From Any Computer Connected to the Same (8:03)
7.WRITING A DNS SPOOFER
61. Intercepting Packets - Creating a Proxy (13:00)
62. Converting Packets to Scapy Packets (9:21)
63. What is DNS Spoofing (7:20)
64. Filtering DNS Responses (6:26)
65. Analysing & Creating a Custom DNS Response (7:56)
66. Modifying Packets On The Fly (7:57)
67. Redirecting DNS Responses (5:45)
8.WRITING A FILE INTERCEPTOR
68. Introduction & Teaser (6:08)
69. Filtering Traffic Based on the Port Used (9:22)
70. Analysing HTTP Requests (5:54)
71. Intercepting HTTP Requests (10:19)
72. Modifying HTTP Responses on The Fly (10:47)
73. Intercepting & Replacing Downloads on The Network (9:24)
9.WRITING A CODE INJECTOR
74. Introduction & Teaser (1:20)
75. Analysing HTTP Responses (6:49)
76. Replacing a Substring Using Regex (7:15)
77. Decoding HTTP Responses (9:48)
78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages (8:50)
79. Refactoring & Housekeeping (8:29)
80. Debugging Issues (6:01)
81. Using Groups & None-capturing Regex (8:57)
82. Recalculating Content Length (11:38)
83. BeEF Overview & Basic Hook Method (6:39)
84. Hooking Computers Using code_injector (5:37)
85. Basic BeEF Commands (4:24)
86. Delivering Malware Using BeEF (5:41)
87. How to Bypass HTTPS (10:49)
88. Bypassing HTTPS & Sniffing Login Credentials (8:04)
89. Replacing Downloads on HTTPS Pages (10:56)
90. Injecting Code in HTTPS Pages (8:35)
10.WRITING AN ARP SPOOF DETECTOR
91. Running Python Programs on Windows (9:45)
92.Capturing & Analysing ARP Responses (6:43)
93. Detecting ARP Spoofing Attacks (7:49)
11.WRITING MALWARE
94. Introduction & Teaser (1:57)
95. Execute System Command Payload (9:40)
96. Sending Reports By Email (11:25)
97. Filtering Command Output Using Regex (10:07)
98. Stealing WiFi Passwords Saved on a Computer (9:34)
99. Downloading Files From Program (7:49)
100. Writing Files on Disk (11:24)
101. Password Recovery Basics (8:19)
102. Using all the Above to Steal Saved Passwords Remotely (8:03)
103. Interacting With The File System (9:43)
12.WRITING MALWARE - KEYLOGGER
104. Introduction & Teaser (3:41)
105. Writing a Basic Local Keylogger (9:59)
106. Global Variables (8:07)
107. Logging Special Keys (6:58)
108. Threading & Recursion (10:59)
109. OOP - Object Oriented Programming Basics (15:07)
110. Constructor Methods & Instance Variables (8:06)
111. Logging Key-strikes and Reporting Them By Email (11:58)
13.WRITING MALWARE - BACKDOORS
112. Introduction & Teaser (5:46)
113. Client - Server Communication & Connection Types (7:46)
114.Learn Python _ Ethical Hacking From Scratch (10:09)
115. Sending & Receiving Data Over TCP (5:19)
116. Executing System Commands Remotely (10:06)
117. Implementing a Server (9:08)
118. Implementing Skeleton For Server - Client Communication (6:58)
119. Refactoring - Creating a Listener Class (8:13)
120. Refactoring - Creating a Backdoor Class (6:23)
121. Serialisation - Theory (11:14)
122. Serialisation - Implementing Reliable Methods (7:55)
123. Serialisation - Reliably Sending & Receiving Data (6:20)
124. Sending Commands as List & Implementing Exit Command (8:16)
125. Interacting With the File System - Implementing cd Command (9:24)
126. Reading Files (7:30)
127. Writing Files (6:52)
128. Downloading Files From Hacked Computer (7:54)
129. Implementing Upload Functionality in Listener (7:53)
130. Implementing Upload Functionality in Backdoor (6:12)
131. Handling Unknown Exceptions (9:37)
132. Using the Backdoor to Hack Windows, Linux & OS X (4:18)
14.WRITING MALWARE - PACKAGING
133. Introduction & Teaser (3:15)
134. Converting Python Programs To Windows Binary Executables (7:12)
135. Running Executables Silentely (7:22)
136. Installing Windows Pyinstaller on Linux (7:43)
137. Packaging Programs For Windows From Linux (8:33)
138. Persistence Idea (8:15)
139. Running Programs on Startup (14:43)
140. Creating a Basic Trojan Using Download & Execute Payload (10:36)
141. Creating a Trojan By Embedding Files In Program Code (8:33)
142. Bypassing Anti-Virus Programs - Theory (5:22)
143. Bypassing Anti-Virus Programs - Practical (9:04)
144. Adding an Icon to Generated Executables (5:14)
145. Spoofing File Extension (9:35)
146. Converting Python Programs To OS X Executables (8:41)
147. Converting Python Programs to Linux Executables (7:23)
15.WEBSITE WEB APPLICATION HACKING
148. Introduction & Teaser (6:42)
149. What is a Website (4:13)
150. How to Hack a Website (5:31)
151. Sending GET Requests To Web Servers (10:00)
152. Discovering Subdomains (11:43)
153. Discovering Hidden Paths in Websites (10:54)
154. Reading Response Content (6:26)
155. Extracting Useful Data From Response (7:08)
156. Filtering Rsults (7:10)
157. Extracting Unique Links & Storing Them In a List (6:42)
158. Recursively Discovering All Paths On a Target Website (9:37)
16.WRITING A PROGRAM TO GUESS LOGIN INFORMATION
159. Sending Post Requests to Websites (11:59)
160. Guessing Login Information on Login Pages (9:05)
17.WRITING A VULNERABILITY SCANNER
161. Introduction & Teaser (2:35)
162. HTTP Requests - POST VS GET (7:05)
163. Parsing HTML Code (8:19)
164. Extracting HTML Attributes (10:30)
165. Posting Forms (10:27)
166. Building Basic Structure For Vulnerability Scanner (11:24)
167. Using Default Parameters (5:08)
168. Sending Requests in a Session (9:16)
169. Extracting & Submitting Forms Automatically (10:06)
170. Implementing a Method To Run The Scanner (6:08)
171. Discovering XSS Vulnerabilities (9:07)
172. Exploiting XSS Vulnerabilities (5:08)
173. Implementing Code To Discover XSS in Forms (8:15)
174. Implementing Code To Discover XSS in Parameters (7:43)
175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner (8:46)
Teach online with
77. Decoding HTTP Responses
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock