Это пробный урок. Оформите подписку, чтобы получить доступ ко всем материалам курса. Премиум

  1. Урок 1. 00:08:19
    Welcome to this course
  2. Урок 2. 00:00:22
    Note: announcement
  3. Урок 3. 00:11:22
    Introduction to Networking
  4. Урок 4. 00:13:17
    Hacking Introduction
  5. Урок 5. 00:04:22
    Tools required
  6. Урок 6. 00:01:44
    Installing go in windows
  7. Урок 7. 00:03:22
    IDE to use
  8. Урок 8. 00:05:03
    Linux Installation
  9. Урок 9. 00:03:19
    Setting up golang
  10. Урок 10. 00:09:27
    How to execute commands
  11. Урок 11. 00:04:02
    Refactoring code
  12. Урок 12. 00:06:22
    Running "ifconfig" command on PC
  13. Урок 13. 00:02:02
    Changing MAC using ifconfig
  14. Урок 14. 00:03:28
    Creating a program to automatically change MAC
  15. Урок 15. 00:08:02
    Creating executable and parsing flags
  16. Урок 16. 00:06:06
    Creating a TCP scanner basic
  17. Урок 17. 00:04:21
    Scanning Multiple ports
  18. Урок 18. 00:01:01
    Scanning Multiple ports continued
  19. Урок 19. 00:06:19
    TCP scanner Concurrent
  20. Урок 20. 00:01:52
    TCP scanner Concurrent continued
  21. Урок 21. 00:10:55
    Network Mapper Introduction - NMAP
  22. Урок 22. 00:13:44
    Nmap in golang
  23. Урок 23. 00:03:38
    Creating an nmap program in golang
  24. Урок 24. 00:06:25
    Address Resolution Protocol - ARP
  25. Урок 25. 00:04:56
    ARP spoofing
  26. Урок 26. 00:01:46
    Installing ARP spoof Program
  27. Урок 27. 00:02:09
    Enabling IP packet forwarding
  28. Урок 28. 00:04:54
    Performing MITM attack
  29. Урок 29. 00:05:10
    Capturing Intercepted Packets
  30. Урок 30. 00:01:34
    Installing gopacket package in golang
  31. Урок 31. 00:05:55
    Finding devices
  32. Урок 32. 00:01:24
    searching for devices over a machine
  33. Урок 33. 00:03:39
    Capturing Packets
  34. Урок 34. 00:05:37
    intercepting live traffic
  35. Урок 35. 00:05:12
    Intercepting traffic from source
  36. Урок 36. 00:02:22
    Spoofed packets
  37. Урок 37. 00:07:52
    Stealing Credentials
  38. Урок 38. 00:02:03
    Stealing Logins over HTTP
  39. Урок 39. 00:05:53
    Introduction to malware
  40. Урок 40. 00:07:11
    Creating Hacker Server
  41. Урок 41. 00:03:36
    Writing Victim Program
  42. Урок 42. 00:02:18
    Running Server and Victim Programs
  43. Урок 43. 00:06:36
    Clean up server program
  44. Урок 44. 00:05:08
    Clean up victim program
  45. Урок 45. 00:04:29
    Sending Data from server to victim
  46. Урок 46. 00:07:43
    Receiving data from hacker server
  47. Урок 47. 00:08:48
    Sending gob structs to victim
  48. Урок 48. 00:02:48
    Receiving gob structs at victim machine
  49. Урок 49. 00:01:43
    Running the program to send and receive gobs
  50. Урок 50. 00:12:05
    Executing command server side
  51. Урок 51. 00:01:18
    Exit condition
  52. Урок 52. 00:06:37
    Victim Side main function
  53. Урок 53. 00:08:24
    Server logic command execution
  54. Урок 54. 00:06:52
    Victim Logic command execution
  55. Урок 55. 00:05:16
    Victim Logic command execution Part 2
  56. Урок 56. 00:00:20
    Minor Error
  57. Урок 57. 00:03:38
    Executing Commands Complete program
  58. Урок 58. 00:00:40
    Introduction
  59. Урок 59. 00:02:27
    setting up victim machine's main program
  60. Урок 60. 00:02:40
    Sending initial current directory to Hacker
  61. Урок 61. 00:04:23
    Receiving initial pwd in server
  62. Урок 62. 00:02:28
    Getting user input
  63. Урок 63. 00:07:08
    Reading User Command
  64. Урок 64. 00:02:52
    Getting Back results
  65. Урок 65. 00:02:18
    Loop Navigation on server side
  66. Урок 66. 00:01:28
    Exit Condition on server
  67. Урок 67. 00:01:51
    Loop navigation on victim side
  68. Урок 68. 00:02:22
    Running the program
  69. Урок 69. 00:02:41
    Introduction how to transfer files
  70. Урок 70. 00:03:38
    Setting main function
  71. Урок 71. 00:02:21
    Check File's existence
  72. Урок 72. 00:04:22
    Reading file contents
  73. Урок 73. 00:02:41
    Creating buffer
  74. Урок 74. 00:04:04
    Sending File to victim machine
  75. Урок 75. 00:02:03
    Setting up main function in victim
  76. Урок 76. 00:06:24
    Saving file on victim's disk
  77. Урок 77. 00:01:44
    Getting back write status
  78. Урок 78. 00:01:46
    Uploading a file
  79. Урок 79. 00:01:26
    Setting up main function in victim machine
  80. Урок 80. 00:05:20
    Getting the list of files in current directory
  81. Урок 81. 00:02:15
    Sending list to hacker
  82. Урок 82. 00:02:35
    Receiving list at hacker
  83. Урок 83. 00:03:20
    Getting user input
  84. Урок 84. 00:01:03
    Converting user input to integer
  85. Урок 85. 00:01:37
    Sending file names to victim
  86. Урок 86. 00:04:33
    Reading file content from victim
  87. Урок 87. 00:03:06
    Writing File content hacker
  88. Урок 88. 00:02:21
    Downloading the file to hacker machine
  89. Урок 89. 00:02:22
    Downloading folder from victim
  90. Урок 90. 00:02:23
    Setting main function
  91. Урок 91. 00:03:22
    getting folders
  92. Урок 92. 00:01:05
    sending folder list to hacker
  93. Урок 93. 00:02:30
    Getting folder list and selecting folder
  94. Урок 94. 00:01:33
    getting folder name on victim
  95. Урок 95. 00:05:38
    Creating Zip file
  96. Урок 96. 00:07:27
    Zip file continued
  97. Урок 97. 00:00:29
    Connection
  98. Урок 98. 00:04:17
    Running Program
  99. Урок 99. 00:05:12
    Introduction to trojan
  100. Урок 100. 00:03:12
    Packaging
  101. Урок 101. 00:03:28
    Running executables
  102. Урок 102. 00:02:21
    Running our malware
  103. Урок 103. 00:03:49
    Hiding console on victim
  104. Урок 104. 00:04:45
    Batch file
  105. Урок 105. 00:02:32
    Batch to exe
  106. Урок 106. 00:04:29
    Adding icon to executable
  107. Урок 107. 00:01:27
    Running exe
  108. Урок 108. 00:02:37
    How to perform attack over public internet
  109. Урок 109. 00:10:06
    Creating a keylogger using go-keylogger package
  110. Урок 110. 00:01:06
    Starting keylogger
  111. Урок 111. 00:02:17
    Stegnography Introduction
  112. Урок 112. 00:01:26
    Installing Package
  113. Урок 113. 00:04:56
    Encoding Data
  114. Урок 114. 00:02:16
    Decoding Data
  115. Урок 115. 00:07:15
    Protection