-
Урок 1.
00:05:17
Welcome to Python for ethical hacking!
-
Урок 2.
00:11:40
VirtualBox installation
-
Урок 3.
00:17:06
Kali Linux installation
-
Урок 4.
00:15:07
Adding Guest Additions
-
Урок 5.
00:13:32
Python in Kali terminal
-
Урок 6.
00:15:31
Coding a simple port scanner
-
Урок 7.
00:09:22
Adding raw_input to our port scanner
-
Урок 8.
00:04:47
Scanning the first 1,000 ports
-
Урок 9.
00:13:13
Coding an advanced port scanner part 1
-
Урок 10.
00:08:49
Coding an advanced port scanner part 2
-
Урок 11.
00:08:56
Finishing and testing our scanner
-
Урок 12.
00:08:14
Configuring IP address and installing Metasploitable
-
Урок 13.
00:14:46
Returning banner from open port
-
Урок 14.
00:11:56
Coding a vulnerability scanner part 1
-
Урок 15.
00:07:20
Coding a vulnerability scanner part 2
-
Урок 16.
00:09:55
Automating SSH login part 1
-
Урок 17.
00:09:21
Automating SSH login part 2
-
Урок 18.
00:08:35
Testing our SSH login program
-
Урок 19.
00:10:38
Coding a SSH brute-forcer
-
Урок 20.
00:10:10
Executing commands on target after brute-forcing SSH
-
Урок 21.
00:09:54
Anonymous FTP login attack
-
Урок 22.
00:17:33
Username & password list attack on FTP
-
Урок 23.
00:08:37
SHA256, SHA512, MD5
-
Урок 24.
00:16:41
Cracking SHA1 hash with online dictionary
-
Урок 25.
00:13:23
Getting password from MD5 hash
-
Урок 26.
00:24:03
Cracking crypt passwords with salt
-
Урок 27.
00:08:35
Changing MAC address manually
-
Урок 28.
00:16:57
Coding MAC address changer
-
Урок 29.
00:04:43
Theory behind ARP spoofing
-
Урок 30.
00:19:27
Crafting malicious ARP packet
-
Урок 31.
00:13:32
Coding ARP spoofer
-
Урок 32.
00:08:05
Forwarding packets and restoring ARP tables
-
Урок 33.
00:12:02
Spoofing our IP address and sending message with TCP payload
-
Урок 34.
00:11:21
Running SynFlooder with changed source IP address
-
Урок 35.
00:24:46
Getting source and destination MAC address from received packets
-
Урок 36.
00:08:10
Sniffing FTP username and password part 1
-
Урок 37.
00:12:10
Sniffing FTP username and password part 2
-
Урок 38.
00:14:02
Getting passwords from HTTP websites
-
Урок 39.
00:10:37
Cloning any webpage
-
Урок 40.
00:09:58
Printing DNS queries
-
Урок 41.
00:16:45
Redirecting response to cloned page
-
Урок 42.
00:10:36
Setting IP table rules and running DNS spoofer
-
Урок 43.
00:16:08
Analyzing Ethernet header
-
Урок 44.
00:10:25
Analyzing IP header part 1
-
Урок 45.
00:25:35
Analyzing IP header part 2
-
Урок 46.
00:15:14
Analyzing TCP header
-
Урок 47.
00:13:21
Analyzing UDP header
-
Урок 48.
00:07:21
Theory behind socket programming
-
Урок 49.
00:07:42
Wine and Pyinstaller installation
-
Урок 50.
00:08:18
Setting up listener
-
Урок 51.
00:06:32
Establishing connection between target and server
-
Урок 52.
00:11:29
Implementing send & receive functions
-
Урок 53.
00:11:44
Executing commands on target system
-
Урок 54.
00:08:20
Importing JSON library to parse data
-
Урок 55.
00:08:15
Converting Python backdoor to .exe
-
Урок 56.
00:09:59
Using OS library to change directory
-
Урок 57.
00:19:08
Downloading & uploading files to target PC
-
Урок 58.
00:13:50
Hiding our backdoor and creating persistence
-
Урок 59.
00:07:53
Trying to connect to server every 20 seconds
-
Урок 60.
00:11:50
Downloading files to target PC
-
Урок 61.
00:23:05
Capturing screenshot on target PC
-
Урок 62.
00:08:15
Administrator privilege check
-
Урок 63.
00:10:45
Starting other programs with our shell
-
Урок 64.
00:20:06
Running our shell as an image, audio, PDF
-
Урок 65.
00:06:20
Installing Pynput
-
Урок 66.
00:08:49
Printing space character
-
Урок 67.
00:09:57
Calling timer on our keylogger
-
Урок 68.
00:12:59
Adding keylogger to our backdoor
-
Урок 69.
00:05:06
What is a threaded server?
-
Урок 70.
00:13:12
Accepting connections with a thread
-
Урок 71.
00:08:40
Managing multiple sessions
-
Урок 72.
00:09:05
Testing threaded server with Windows 10 target
-
Урок 73.
00:11:12
Fixing Q command
-
Урок 74.
00:13:52
Coding exit function
-
Урок 75.
00:16:27
Attacking multiple targets and gathering botnet
-
Урок 76.
00:21:56
Stealing saved wireless passwords
-
Урок 77.
00:03:03
Saving passwords to a file
-
Урок 78.
00:10:14
Bruteforcing Gmail
-
Урок 79.
00:13:00
Bruteforcing any login page part 1
-
Урок 80.
00:10:08
Bruteforcing any login page part 2
-
Урок 81.
00:05:11
Finding hidden directories part 1
-
Урок 82.
00:06:37
Finding hidden directories part 2
-
Урок 83.
00:11:33
Discovering subdomains
-
Урок 84.
00:13:56
Changing HTTP headers
-
Урок 85.
00:10:24
Starting basic and digest authentication bruteforcer
-
Урок 86.
00:08:36
Controlling threads
-
Урок 87.
00:10:07
Coding run function
-
Урок 88.
00:12:34
Printing usage and testing our program
-
Урок 89.
00:08:20
Taking a look at ransomware