1. Урок 1. 00:05:17
    Welcome to Python for ethical hacking!
  2. Урок 2. 00:11:40
    VirtualBox installation
  3. Урок 3. 00:17:06
    Kali Linux installation
  4. Урок 4. 00:15:07
    Adding Guest Additions
  5. Урок 5. 00:13:32
    Python in Kali terminal
  6. Урок 6. 00:15:31
    Coding a simple port scanner
  7. Урок 7. 00:09:22
    Adding raw_input to our port scanner
  8. Урок 8. 00:04:47
    Scanning the first 1,000 ports
  9. Урок 9. 00:13:13
    Coding an advanced port scanner part 1
  10. Урок 10. 00:08:49
    Coding an advanced port scanner part 2
  11. Урок 11. 00:08:56
    Finishing and testing our scanner
  12. Урок 12. 00:08:14
    Configuring IP address and installing Metasploitable
  13. Урок 13. 00:14:46
    Returning banner from open port
  14. Урок 14. 00:11:56
    Coding a vulnerability scanner part 1
  15. Урок 15. 00:07:20
    Coding a vulnerability scanner part 2
  16. Урок 16. 00:09:55
    Automating SSH login part 1
  17. Урок 17. 00:09:21
    Automating SSH login part 2
  18. Урок 18. 00:08:35
    Testing our SSH login program
  19. Урок 19. 00:10:38
    Coding a SSH brute-forcer
  20. Урок 20. 00:10:10
    Executing commands on target after brute-forcing SSH
  21. Урок 21. 00:09:54
    Anonymous FTP login attack
  22. Урок 22. 00:17:33
    Username & password list attack on FTP
  23. Урок 23. 00:08:37
    SHA256, SHA512, MD5
  24. Урок 24. 00:16:41
    Cracking SHA1 hash with online dictionary
  25. Урок 25. 00:13:23
    Getting password from MD5 hash
  26. Урок 26. 00:24:03
    Cracking crypt passwords with salt
  27. Урок 27. 00:08:35
    Changing MAC address manually
  28. Урок 28. 00:16:57
    Coding MAC address changer
  29. Урок 29. 00:04:43
    Theory behind ARP spoofing
  30. Урок 30. 00:19:27
    Crafting malicious ARP packet
  31. Урок 31. 00:13:32
    Coding ARP spoofer
  32. Урок 32. 00:08:05
    Forwarding packets and restoring ARP tables
  33. Урок 33. 00:12:02
    Spoofing our IP address and sending message with TCP payload
  34. Урок 34. 00:11:21
    Running SynFlooder with changed source IP address
  35. Урок 35. 00:24:46
    Getting source and destination MAC address from received packets
  36. Урок 36. 00:08:10
    Sniffing FTP username and password part 1
  37. Урок 37. 00:12:10
    Sniffing FTP username and password part 2
  38. Урок 38. 00:14:02
    Getting passwords from HTTP websites
  39. Урок 39. 00:10:37
    Cloning any webpage
  40. Урок 40. 00:09:58
    Printing DNS queries
  41. Урок 41. 00:16:45
    Redirecting response to cloned page
  42. Урок 42. 00:10:36
    Setting IP table rules and running DNS spoofer
  43. Урок 43. 00:16:08
    Analyzing Ethernet header
  44. Урок 44. 00:10:25
    Analyzing IP header part 1
  45. Урок 45. 00:25:35
    Analyzing IP header part 2
  46. Урок 46. 00:15:14
    Analyzing TCP header
  47. Урок 47. 00:13:21
    Analyzing UDP header
  48. Урок 48. 00:07:21
    Theory behind socket programming
  49. Урок 49. 00:07:42
    Wine and Pyinstaller installation
  50. Урок 50. 00:08:18
    Setting up listener
  51. Урок 51. 00:06:32
    Establishing connection between target and server
  52. Урок 52. 00:11:29
    Implementing send & receive functions
  53. Урок 53. 00:11:44
    Executing commands on target system
  54. Урок 54. 00:08:20
    Importing JSON library to parse data
  55. Урок 55. 00:08:15
    Converting Python backdoor to .exe
  56. Урок 56. 00:09:59
    Using OS library to change directory
  57. Урок 57. 00:19:08
    Downloading & uploading files to target PC
  58. Урок 58. 00:13:50
    Hiding our backdoor and creating persistence
  59. Урок 59. 00:07:53
    Trying to connect to server every 20 seconds
  60. Урок 60. 00:11:50
    Downloading files to target PC
  61. Урок 61. 00:23:05
    Capturing screenshot on target PC
  62. Урок 62. 00:08:15
    Administrator privilege check
  63. Урок 63. 00:10:45
    Starting other programs with our shell
  64. Урок 64. 00:20:06
    Running our shell as an image, audio, PDF
  65. Урок 65. 00:06:20
    Installing Pynput
  66. Урок 66. 00:08:49
    Printing space character
  67. Урок 67. 00:09:57
    Calling timer on our keylogger
  68. Урок 68. 00:12:59
    Adding keylogger to our backdoor
  69. Урок 69. 00:05:06
    What is a threaded server?
  70. Урок 70. 00:13:12
    Accepting connections with a thread
  71. Урок 71. 00:08:40
    Managing multiple sessions
  72. Урок 72. 00:09:05
    Testing threaded server with Windows 10 target
  73. Урок 73. 00:11:12
    Fixing Q command
  74. Урок 74. 00:13:52
    Coding exit function
  75. Урок 75. 00:16:27
    Attacking multiple targets and gathering botnet
  76. Урок 76. 00:21:56
    Stealing saved wireless passwords
  77. Урок 77. 00:03:03
    Saving passwords to a file
  78. Урок 78. 00:10:14
    Bruteforcing Gmail
  79. Урок 79. 00:13:00
    Bruteforcing any login page part 1
  80. Урок 80. 00:10:08
    Bruteforcing any login page part 2
  81. Урок 81. 00:05:11
    Finding hidden directories part 1
  82. Урок 82. 00:06:37
    Finding hidden directories part 2
  83. Урок 83. 00:11:33
    Discovering subdomains
  84. Урок 84. 00:13:56
    Changing HTTP headers
  85. Урок 85. 00:10:24
    Starting basic and digest authentication bruteforcer
  86. Урок 86. 00:08:36
    Controlling threads
  87. Урок 87. 00:10:07
    Coding run function
  88. Урок 88. 00:12:34
    Printing usage and testing our program
  89. Урок 89. 00:08:20
    Taking a look at ransomware