1. Урок 1.00:05:17
    Welcome to Python for ethical hacking!
  2. Урок 2.00:11:40
    VirtualBox installation
  3. Урок 3.00:17:06
    Kali Linux installation
  4. Урок 4.00:15:07
    Adding Guest Additions
  5. Урок 5.00:13:32
    Python in Kali terminal
  6. Урок 6.00:15:31
    Coding a simple port scanner
  7. Урок 7.00:09:22
    Adding raw_input to our port scanner
  8. Урок 8.00:04:47
    Scanning the first 1,000 ports
  9. Урок 9.00:13:13
    Coding an advanced port scanner part 1
  10. Урок 10.00:08:49
    Coding an advanced port scanner part 2
  11. Урок 11.00:08:56
    Finishing and testing our scanner
  12. Урок 12.00:08:14
    Configuring IP address and installing Metasploitable
  13. Урок 13.00:14:46
    Returning banner from open port
  14. Урок 14.00:11:56
    Coding a vulnerability scanner part 1
  15. Урок 15.00:07:20
    Coding a vulnerability scanner part 2
  16. Урок 16.00:09:55
    Automating SSH login part 1
  17. Урок 17.00:09:21
    Automating SSH login part 2
  18. Урок 18.00:08:35
    Testing our SSH login program
  19. Урок 19.00:10:38
    Coding a SSH brute-forcer
  20. Урок 20.00:10:10
    Executing commands on target after brute-forcing SSH
  21. Урок 21.00:09:54
    Anonymous FTP login attack
  22. Урок 22.00:17:33
    Username & password list attack on FTP
  23. Урок 23.00:08:37
    SHA256, SHA512, MD5
  24. Урок 24.00:16:41
    Cracking SHA1 hash with online dictionary
  25. Урок 25.00:13:23
    Getting password from MD5 hash
  26. Урок 26.00:24:03
    Cracking crypt passwords with salt
  27. Урок 27.00:08:35
    Changing MAC address manually
  28. Урок 28.00:16:57
    Coding MAC address changer
  29. Урок 29.00:04:43
    Theory behind ARP spoofing
  30. Урок 30.00:19:27
    Crafting malicious ARP packet
  31. Урок 31.00:13:32
    Coding ARP spoofer
  32. Урок 32.00:08:05
    Forwarding packets and restoring ARP tables
  33. Урок 33.00:12:02
    Spoofing our IP address and sending message with TCP payload
  34. Урок 34.00:11:21
    Running SynFlooder with changed source IP address
  35. Урок 35.00:24:46
    Getting source and destination MAC address from received packets
  36. Урок 36.00:08:10
    Sniffing FTP username and password part 1
  37. Урок 37.00:12:10
    Sniffing FTP username and password part 2
  38. Урок 38.00:14:02
    Getting passwords from HTTP websites
  39. Урок 39.00:10:37
    Cloning any webpage
  40. Урок 40.00:09:58
    Printing DNS queries
  41. Урок 41.00:16:45
    Redirecting response to cloned page
  42. Урок 42.00:10:36
    Setting IP table rules and running DNS spoofer
  43. Урок 43.00:16:08
    Analyzing Ethernet header
  44. Урок 44.00:10:25
    Analyzing IP header part 1
  45. Урок 45.00:25:35
    Analyzing IP header part 2
  46. Урок 46.00:15:14
    Analyzing TCP header
  47. Урок 47.00:13:21
    Analyzing UDP header
  48. Урок 48.00:07:21
    Theory behind socket programming
  49. Урок 49.00:07:42
    Wine and Pyinstaller installation
  50. Урок 50.00:08:18
    Setting up listener
  51. Урок 51.00:06:32
    Establishing connection between target and server
  52. Урок 52.00:11:29
    Implementing send & receive functions
  53. Урок 53.00:11:44
    Executing commands on target system
  54. Урок 54.00:08:20
    Importing JSON library to parse data
  55. Урок 55.00:08:15
    Converting Python backdoor to .exe
  56. Урок 56.00:09:59
    Using OS library to change directory
  57. Урок 57.00:19:08
    Downloading & uploading files to target PC
  58. Урок 58.00:13:50
    Hiding our backdoor and creating persistence
  59. Урок 59.00:07:53
    Trying to connect to server every 20 seconds
  60. Урок 60.00:11:50
    Downloading files to target PC
  61. Урок 61.00:23:05
    Capturing screenshot on target PC
  62. Урок 62.00:08:15
    Administrator privilege check
  63. Урок 63.00:10:45
    Starting other programs with our shell
  64. Урок 64.00:20:06
    Running our shell as an image, audio, PDF
  65. Урок 65.00:06:20
    Installing Pynput
  66. Урок 66.00:08:49
    Printing space character
  67. Урок 67.00:09:57
    Calling timer on our keylogger
  68. Урок 68.00:12:59
    Adding keylogger to our backdoor
  69. Урок 69.00:05:06
    What is a threaded server?
  70. Урок 70.00:13:12
    Accepting connections with a thread
  71. Урок 71.00:08:40
    Managing multiple sessions
  72. Урок 72.00:09:05
    Testing threaded server with Windows 10 target
  73. Урок 73.00:11:12
    Fixing Q command
  74. Урок 74.00:13:52
    Coding exit function
  75. Урок 75.00:16:27
    Attacking multiple targets and gathering botnet
  76. Урок 76.00:21:56
    Stealing saved wireless passwords
  77. Урок 77.00:03:03
    Saving passwords to a file
  78. Урок 78.00:10:14
    Bruteforcing Gmail
  79. Урок 79.00:13:00
    Bruteforcing any login page part 1
  80. Урок 80.00:10:08
    Bruteforcing any login page part 2
  81. Урок 81.00:05:11
    Finding hidden directories part 1
  82. Урок 82.00:06:37
    Finding hidden directories part 2
  83. Урок 83.00:11:33
    Discovering subdomains
  84. Урок 84.00:13:56
    Changing HTTP headers
  85. Урок 85.00:10:24
    Starting basic and digest authentication bruteforcer
  86. Урок 86.00:08:36
    Controlling threads
  87. Урок 87.00:10:07
    Coding run function
  88. Урок 88.00:12:34
    Printing usage and testing our program
  89. Урок 89.00:08:20
    Taking a look at ransomware