-
Урок 1.
00:07:30
Teaser
-
Урок 2.
00:06:32
Course Introduction
-
Урок 3.
00:06:14
Introduction to Python Programming & Ethical Hacking
-
Урок 4.
00:07:49
Lab Overview & Needed Software
-
Урок 5.
00:11:14
Installing Kali 2020 as a virtual Machine
-
Урок 6.
00:05:11
Basic Overview of Kali Linux
-
Урок 7.
00:11:22
The Terminal & Linux Commands
-
Урок 8.
00:09:09
Python 2 VS Python 3 & Writing Our First Program
-
Урок 9.
00:09:33
Installing & Using a Python IDE
-
Урок 10.
00:07:42
What is MAC Address & How To Change it
-
Урок 11.
00:09:19
Using Python Modules & Executing System Commands
-
Урок 12.
00:05:18
Implementing a Very Basic MAC Changer
-
Урок 13.
00:10:14
Variables & Strings
-
Урок 14.
00:04:37
Using Variables in MAC Changer
-
Урок 15.
00:06:19
Getting Input From The User
-
Урок 16.
00:09:41
Handling User Input
-
Урок 17.
00:09:45
Handling Command-line Arguments
-
Урок 18.
00:07:52
Initialising Variables Based on Command-line Arguments
-
Урок 19.
00:09:41
Python Functions
-
Урок 20.
00:06:56
Returning Values From Functions
-
Урок 21.
00:06:55
Decision Making in Python
-
Урок 22.
00:09:06
Using Conditional Statements in MAC Changer
-
Урок 23.
00:03:16
Introduction to Algorithms
-
Урок 24.
00:06:25
Reading Output Returned By System Commands
-
Урок 25.
00:08:15
Introduction to Regular Expressions (Regex)
-
Урок 26.
00:06:41
Extracting a Substring Using Regex
-
Урок 27.
00:11:00
Refactoring & Housekeeping
-
Урок 28.
00:06:13
Implementing The Validation Algorithm
-
Урок 29.
00:06:23
Python 3 Compatibility
-
Урок 30.
00:10:12
Introduction & Teaser
-
Урок 31.
00:03:33
Installing Windows as a Virtual Machine
-
Урок 32.
00:09:44
Introduction to ARP
-
Урок 33.
00:04:01
Designing an Algorithm To Discover Clients on The Same Network
-
Урок 34.
00:06:49
Using Scapy To Create an ARP Request
-
Урок 35.
00:09:38
Combining Frames To Broadcast Packets
-
Урок 36.
00:06:58
Sending & Receiving Packets
-
Урок 37.
00:08:22
Introduction Lists in Python
-
Урок 38.
00:10:10
Iterating Over Lists & Analysing Packet
-
Урок 39.
00:06:30
Using Escape Characters To Improve Program Output
-
Урок 40.
00:09:38
Introduction to Dictionaries in Python
-
Урок 41.
00:08:56
Improving the Program Using a List of Dictionaries
-
Урок 42.
00:07:19
Iterating Over Nested Data Structures
-
Урок 43.
00:06:56
Testing The Network Scanner With Python 3
-
Урок 44.
00:06:21
What is ARP Spoofing?
-
Урок 45.
00:05:09
Intercepting Data in a Network Using arpspoof
-
Урок 46.
00:07:12
Creating an ARP Response
-
Урок 47.
00:05:35
Sending ARP Responses
-
Урок 48.
00:07:00
Extracting MAC Address From Responses
-
Урок 49.
00:08:54
Introduction to Loops in Python
-
Урок 50.
00:07:57
More on Loops & Counters
-
Урок 51.
00:06:55
Dynamic Printing
-
Урок 52.
00:05:17
Exception Handling in Python
-
Урок 53.
00:11:56
Implementing a Restore Function
-
Урок 54.
00:05:34
Restoring ARP Tables on Exception
-
Урок 55.
00:04:40
Introduction & Teaser
-
Урок 56.
00:07:21
Sniffing Packets Using Scapy
-
Урок 57.
00:06:51
Extracting data From a Specific Layer
-
Урок 58.
00:12:22
Analysing Sniffed Packets & Extracting Fields From Layers
-
Урок 59.
00:11:06
Analysing Fields & Extracting Passwords
-
Урок 60.
00:08:01
Extracting URLs
-
Урок 61.
00:08:04
Capturing Passwords From Any Computer Connected to the Same Network
-
Урок 62.
00:07:21
Strings & Bytes in Python 3
-
Урок 63.
00:13:01
Intercepting Packets - Creating a Proxy
-
Урок 64.
00:09:22
Converting Packets to Scapy Packets
-
Урок 65.
00:07:21
Introduction to DNS Spoofing
-
Урок 66.
00:06:27
Filtering DNS Responses
-
Урок 67.
00:07:57
Analysing & Creating a Custom DNS Response
-
Урок 68.
00:07:58
Modifying Packets On The Fly
-
Урок 69.
00:05:46
Redirecting DNS Responses
-
Урок 70.
00:04:28
Introduction & Teaser
-
Урок 71.
00:09:23
Filtering Traffic Based on the Port Used
-
Урок 72.
00:05:55
Analysing HTTP Requests
-
Урок 73.
00:10:20
Intercepting HTTP Requests
-
Урок 74.
00:10:48
Modifying HTTP Responses on The Fly
-
Урок 75.
00:09:25
Intercepting & Replacing Downloads on The Network
-
Урок 76.
00:01:21
Introduction & Teaser
-
Урок 77.
00:06:50
Analysing HTTP Responses
-
Урок 78.
00:07:16
Replacing a Substring Using Regex
-
Урок 79.
00:09:49
Decoding HTTP Responses
-
Урок 80.
00:08:51
Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
-
Урок 81.
00:08:30
Refactoring & Housekeeping
-
Урок 82.
00:06:02
Debugging Issues in Python
-
Урок 83.
00:08:58
Using Groups & None-capturing Regex
-
Урок 84.
00:11:39
Recalculating Content Length
-
Урок 85.
00:11:42
BeEF Overview & Basic Hook Method
-
Урок 86.
00:05:38
Hooking Computers Using code_injector
-
Урок 87.
00:04:25
Basic BeEF Commands
-
Урок 88.
00:05:42
Delivering Malware Using BeEF
-
Урок 89.
00:10:50
How to Bypass HTTPS
-
Урок 90.
00:08:05
Bypassing HTTPS & Sniffing Login Credentials
-
Урок 91.
00:10:57
Replacing Downloads on HTTPS Pages
-
Урок 92.
00:08:36
Injecting Code in HTTPS Pages
-
Урок 93.
00:09:46
Running Python Programs on Windows
-
Урок 94.
00:06:44
Capturing & Analysing ARP Responses
-
Урок 95.
00:07:51
Detecting ARP Spoofing Attacks Using Python
-
Урок 96.
00:01:58
Introduction & Teaser
-
Урок 97.
00:09:41
Execute System Command Payload
-
Урок 98.
00:11:26
Sending Emails Using Python
-
Урок 99.
00:10:08
Filtering Command Output Using Regex
-
Урок 100.
00:09:35
Stealing WiFi Passwords Saved on a Computer
-
Урок 101.
00:07:50
Downloading Files Using Python
-
Урок 102.
00:11:25
Writing Files on Disk
-
Урок 103.
00:08:20
Password Recovery Basics
-
Урок 104.
00:08:04
Stealing Saved Passwords From Remote Computers
-
Урок 105.
00:09:44
Interacting With The File System Using Python
-
Урок 106.
00:03:42
Introduction & Teaser
-
Урок 107.
00:10:01
Writing a Basic Local Keylogger Using Python
-
Урок 108.
00:08:08
Introduction to Global Variables
-
Урок 109.
00:06:59
Logging Special Keys
-
Урок 110.
00:11:00
Introduction to Threading & Recursion in Python
-
Урок 111.
00:15:08
Introduction Object Oriented Programming
-
Урок 112.
00:08:07
Constructor Methods & Instance Variables
-
Урок 113.
00:11:59
Logging Key-strikes and Reporting Them By Email
-
Урок 114.
00:05:47
Introduction & Teaser
-
Урок 115.
00:07:47
Client - Server Communication & Connection Types
-
Урок 116.
00:10:10
Connecting Two Remote Computers Using Sockets
-
Урок 117.
00:05:20
Sending & Receiving Data Over TCP
-
Урок 118.
00:10:07
Executing System Commands Remotely
-
Урок 119.
00:09:09
Implementing a Server
-
Урок 120.
00:06:59
Implementing Skeleton For Server - Client Communication
-
Урок 121.
00:08:14
Refactoring - Creating a Listener Class
-
Урок 122.
00:06:24
Refactoring - Creating a Backdoor Class
-
Урок 123.
00:11:15
Serialisation - Theory
-
Урок 124.
00:07:56
Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP
-
Урок 125.
00:06:21
Serialisation - Reliably Sending & Receiving Data
-
Урок 126.
00:08:17
Sending Commands as List & Implementing Exit Command
-
Урок 127.
00:09:25
Interacting With the File System - Implementing "cd" Command
-
Урок 128.
00:07:31
Reading Files Using Python
-
Урок 129.
00:06:53
Writing Files Using Python
-
Урок 130.
00:07:55
Downloading Files From Hacked Computer
-
Урок 131.
00:07:54
Implementing Upload Functionality in Listener
-
Урок 132.
00:06:13
Implementing Upload Functionality in Backdoor
-
Урок 133.
00:09:39
Handling Unknown Exceptions
-
Урок 134.
00:12:33
Using the Backdoor to Hack Windows, Linux & OS X
-
Урок 135.
00:14:52
Testing The Backdoor With Python 3.
-
Урок 136.
00:03:16
Introduction & Teaser
-
Урок 137.
00:07:13
Converting Python Programs To Windows Binary Executables
-
Урок 138.
00:07:23
Running Executables Silentely
-
Урок 139.
00:07:44
Installing Windows Pyinstaller on Linux
-
Урок 140.
00:08:35
Packaging Programs For Windows From Linux
-
Урок 141.
00:08:16
Introduction to Persistence
-
Урок 142.
00:14:44
Running Programs on Startup
-
Урок 143.
00:10:37
Creating a Basic Trojan Using Download & Execute Payload
-
Урок 144.
00:08:34
Creating a Trojan By Embedding Files In Program Code
-
Урок 145.
00:05:23
Bypassing Anti-Virus Programs - Theory
-
Урок 146.
00:09:05
Bypassing Anti-Virus Programs - Practical
-
Урок 147.
00:05:15
Adding an Icon to Generated Executables
-
Урок 148.
00:09:36
Spoofing File Extension
-
Урок 149.
00:08:42
Converting Python Programs To OS X Executables
-
Урок 150.
00:07:24
Converting Python Programs to Linux Executables
-
Урок 151.
00:06:43
Introduction & Teaser
-
Урок 152.
00:04:14
What is a Website
-
Урок 153.
00:05:32
How to Hack a Website
-
Урок 154.
00:10:01
Sending GET Requests To Web Servers
-
Урок 155.
00:11:45
Discovering Website Subdomains Using Python
-
Урок 156.
00:10:55
Discovering Hidden Paths in Websites
-
Урок 157.
00:06:27
Reading Response Content
-
Урок 158.
00:07:09
Extracting Useful Data From Response
-
Урок 159.
00:07:11
Filtering Rsults
-
Урок 160.
00:06:43
Extracting Unique Links & Storing Them In a List
-
Урок 161.
00:09:38
Recursively Discovering All Paths On a Target Website
-
Урок 162.
00:06:43
Testing The Crawler With Python 3
-
Урок 163.
00:12:00
Sending Post Requests to Websites
-
Урок 164.
00:09:06
Guessing Login Information on Login Pages
-
Урок 165.
00:02:36
Introduction & Teaser
-
Урок 166.
00:07:06
HTTP Requests - POST VS GET
-
Урок 167.
00:08:20
Parsing HTML Code Using Python
-
Урок 168.
00:10:31
Extracting HTML Attributes
-
Урок 169.
00:10:28
Posting Forms
-
Урок 170.
00:11:25
Building Basic Structure For a Vulnerability Scanner
-
Урок 171.
00:05:09
Using Default Parameters
-
Урок 172.
00:09:17
Sending Requests in a Session
-
Урок 173.
00:10:08
Extracting & Submitting Forms Automatically
-
Урок 174.
00:06:09
Implementing a Method To Run The Scanner
-
Урок 175.
00:09:08
Discovering XSS Vulnerabilities
-
Урок 176.
00:05:09
Exploiting XSS Vulnerabilities
-
Урок 177.
00:08:16
Implementing Code To Discover XSS in Forms
-
Урок 178.
00:07:44
Implementing Code To Discover XSS in Parameters
-
Урок 179.
00:08:47
Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
Could you update the course, please.
Thank so much for your efforts.