Урок 1.00:07:30
Teaser
Урок 2.00:06:32
Course Introduction
Урок 3.00:06:14
Introduction to Python Programming & Ethical Hacking
Урок 4.00:07:49
Lab Overview & Needed Software
Урок 5.00:11:14
Installing Kali 2020 as a virtual Machine
Урок 6.00:05:11
Basic Overview of Kali Linux
Урок 7.00:11:22
The Terminal & Linux Commands
Урок 8.00:09:09
Python 2 VS Python 3 & Writing Our First Program
Урок 9.00:09:33
Installing & Using a Python IDE
Урок 10.00:07:42
What is MAC Address & How To Change it
Урок 11.00:09:19
Using Python Modules & Executing System Commands
Урок 12.00:05:18
Implementing a Very Basic MAC Changer
Урок 13.00:10:14
Variables & Strings
Урок 14.00:04:37
Using Variables in MAC Changer
Урок 15.00:06:19
Getting Input From The User
Урок 16.00:09:41
Handling User Input
Урок 17.00:09:45
Handling Command-line Arguments
Урок 18.00:07:52
Initialising Variables Based on Command-line Arguments
Урок 19.00:09:41
Python Functions
Урок 20.00:06:56
Returning Values From Functions
Урок 21.00:06:55
Decision Making in Python
Урок 22.00:09:06
Using Conditional Statements in MAC Changer
Урок 23.00:03:16
Introduction to Algorithms
Урок 24.00:06:25
Reading Output Returned By System Commands
Урок 25.00:08:15
Introduction to Regular Expressions (Regex)
Урок 26.00:06:41
Extracting a Substring Using Regex
Урок 27.00:11:00
Refactoring & Housekeeping
Урок 28.00:06:13
Implementing The Validation Algorithm
Урок 29.00:06:23
Python 3 Compatibility
Урок 30.00:10:12
Introduction & Teaser
Урок 31.00:03:33
Installing Windows as a Virtual Machine
Урок 32.00:09:44
Introduction to ARP
Урок 33.00:04:01
Designing an Algorithm To Discover Clients on The Same Network
Урок 34.00:06:49
Using Scapy To Create an ARP Request
Урок 35.00:09:38
Combining Frames To Broadcast Packets
Урок 36.00:06:58
Sending & Receiving Packets
Урок 37.00:08:22
Introduction Lists in Python
Урок 38.00:10:10
Iterating Over Lists & Analysing Packet
Урок 39.00:06:30
Using Escape Characters To Improve Program Output
Урок 40.00:09:38
Introduction to Dictionaries in Python
Урок 41.00:08:56
Improving the Program Using a List of Dictionaries
Урок 42.00:07:19
Iterating Over Nested Data Structures
Урок 43.00:06:56
Testing The Network Scanner With Python 3
Урок 44.00:06:21
What is ARP Spoofing?
Урок 45.00:05:09
Intercepting Data in a Network Using arpspoof
Урок 46.00:07:12
Creating an ARP Response
Урок 47.00:05:35
Sending ARP Responses
Урок 48.00:07:00
Extracting MAC Address From Responses
Урок 49.00:08:54
Introduction to Loops in Python
Урок 50.00:07:57
More on Loops & Counters
Урок 51.00:06:55
Dynamic Printing
Урок 52.00:05:17
Exception Handling in Python
Урок 53.00:11:56
Implementing a Restore Function
Урок 54.00:05:34
Restoring ARP Tables on Exception
Урок 55.00:04:40
Introduction & Teaser
Урок 56.00:07:21
Sniffing Packets Using Scapy
Урок 57.00:06:51
Extracting data From a Specific Layer
Урок 58.00:12:22
Analysing Sniffed Packets & Extracting Fields From Layers
Урок 59.00:11:06
Analysing Fields & Extracting Passwords
Урок 60.00:08:01
Extracting URLs
Урок 61.00:08:04
Capturing Passwords From Any Computer Connected to the Same Network
Урок 62.00:07:21
Strings & Bytes in Python 3
Урок 63.00:13:01
Intercepting Packets - Creating a Proxy
Урок 64.00:09:22
Converting Packets to Scapy Packets
Урок 65.00:07:21
Introduction to DNS Spoofing
Урок 66.00:06:27
Filtering DNS Responses
Урок 67.00:07:57
Analysing & Creating a Custom DNS Response
Урок 68.00:07:58
Modifying Packets On The Fly
Урок 69.00:05:46
Redirecting DNS Responses
Урок 70.00:04:28
Introduction & Teaser
Урок 71.00:09:23
Filtering Traffic Based on the Port Used
Урок 72.00:05:55
Analysing HTTP Requests
Урок 73.00:10:20
Intercepting HTTP Requests
Урок 74.00:10:48
Modifying HTTP Responses on The Fly
Урок 75.00:09:25
Intercepting & Replacing Downloads on The Network
Урок 76.00:01:21
Introduction & Teaser
Урок 77.00:06:50
Analysing HTTP Responses
Урок 78.00:07:16
Replacing a Substring Using Regex
Урок 79.00:09:49
Decoding HTTP Responses
Урок 80.00:08:51
Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
Урок 81.00:08:30
Refactoring & Housekeeping
Урок 82.00:06:02
Debugging Issues in Python
Урок 83.00:08:58
Using Groups & None-capturing Regex
Урок 84.00:11:39
Recalculating Content Length
Урок 85.00:11:42
BeEF Overview & Basic Hook Method
Урок 86.00:05:38
Hooking Computers Using code_injector
Урок 87.00:04:25
Basic BeEF Commands
Урок 88.00:05:42
Delivering Malware Using BeEF
Урок 89.00:10:50
How to Bypass HTTPS
Урок 90.00:08:05
Bypassing HTTPS & Sniffing Login Credentials
Урок 91.00:10:57
Replacing Downloads on HTTPS Pages
Урок 92.00:08:36
Injecting Code in HTTPS Pages
Урок 93.00:09:46
Running Python Programs on Windows
Урок 94.00:06:44
Capturing & Analysing ARP Responses
Урок 95.00:07:51
Detecting ARP Spoofing Attacks Using Python
Урок 96.00:01:58
Introduction & Teaser
Урок 97.00:09:41
Execute System Command Payload
Урок 98.00:11:26
Sending Emails Using Python
Урок 99.00:10:08
Filtering Command Output Using Regex
Урок 100.00:09:35
Stealing WiFi Passwords Saved on a Computer
Урок 101.00:07:50
Downloading Files Using Python
Урок 102.00:11:25
Writing Files on Disk
Урок 103.00:08:20
Password Recovery Basics
Урок 104.00:08:04
Stealing Saved Passwords From Remote Computers
Урок 105.00:09:44
Interacting With The File System Using Python
Урок 106.00:03:42
Introduction & Teaser
Урок 107.00:10:01
Writing a Basic Local Keylogger Using Python
Урок 108.00:08:08
Introduction to Global Variables
Урок 109.00:06:59
Logging Special Keys
Урок 110.00:11:00
Introduction to Threading & Recursion in Python
Урок 111.00:15:08
Introduction Object Oriented Programming
Урок 112.00:08:07
Constructor Methods & Instance Variables
Урок 113.00:11:59
Logging Key-strikes and Reporting Them By Email
Урок 114.00:05:47
Introduction & Teaser
Урок 115.00:07:47
Client - Server Communication & Connection Types
Урок 116.00:10:10
Connecting Two Remote Computers Using Sockets
Урок 117.00:05:20
Sending & Receiving Data Over TCP
Урок 118.00:10:07
Executing System Commands Remotely
Урок 119.00:09:09
Implementing a Server
Урок 120.00:06:59
Implementing Skeleton For Server - Client Communication
Урок 121.00:08:14
Refactoring - Creating a Listener Class
Урок 122.00:06:24
Refactoring - Creating a Backdoor Class
Урок 123.00:11:15
Serialisation - Theory
Урок 124.00:07:56
Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP
Урок 125.00:06:21
Serialisation - Reliably Sending & Receiving Data
Урок 126.00:08:17
Sending Commands as List & Implementing Exit Command
Урок 127.00:09:25
Interacting With the File System - Implementing "cd" Command
Урок 128.00:07:31
Reading Files Using Python
Урок 129.00:06:53
Writing Files Using Python
Урок 130.00:07:55
Downloading Files From Hacked Computer
Урок 131.00:07:54
Implementing Upload Functionality in Listener
Урок 132.00:06:13
Implementing Upload Functionality in Backdoor
Урок 133.00:09:39
Handling Unknown Exceptions
Урок 134.00:12:33
Using the Backdoor to Hack Windows, Linux & OS X
Урок 135.00:14:52
Testing The Backdoor With Python 3.
Урок 136.00:03:16
Introduction & Teaser
Урок 137.00:07:13
Converting Python Programs To Windows Binary Executables
Урок 138.00:07:23
Running Executables Silentely
Урок 139.00:07:44
Installing Windows Pyinstaller on Linux
Урок 140.00:08:35
Packaging Programs For Windows From Linux
Урок 141.00:08:16
Introduction to Persistence
Урок 142.00:14:44
Running Programs on Startup
Урок 143.00:10:37
Creating a Basic Trojan Using Download & Execute Payload
Урок 144.00:08:34
Creating a Trojan By Embedding Files In Program Code
Урок 145.00:05:23
Bypassing Anti-Virus Programs - Theory
Урок 146.00:09:05
Bypassing Anti-Virus Programs - Practical
Урок 147.00:05:15
Adding an Icon to Generated Executables
Урок 148.00:09:36
Spoofing File Extension
Урок 149.00:08:42
Converting Python Programs To OS X Executables
Урок 150.00:07:24
Converting Python Programs to Linux Executables
Урок 151.00:06:43
Introduction & Teaser
Урок 152.00:04:14
What is a Website
Урок 153.00:05:32
How to Hack a Website
Урок 154.00:10:01
Sending GET Requests To Web Servers
Урок 155.00:11:45
Discovering Website Subdomains Using Python
Урок 156.00:10:55
Discovering Hidden Paths in Websites
Урок 157.00:06:27
Reading Response Content
Урок 158.00:07:09
Extracting Useful Data From Response
Урок 159.00:07:11
Filtering Rsults
Урок 160.00:06:43
Extracting Unique Links & Storing Them In a List
Урок 161.00:09:38
Recursively Discovering All Paths On a Target Website
Урок 162.00:06:43
Testing The Crawler With Python 3
Урок 163.00:12:00
Sending Post Requests to Websites
Урок 164.00:09:06
Guessing Login Information on Login Pages
Урок 165.00:02:36
Introduction & Teaser
Урок 166.00:07:06
HTTP Requests - POST VS GET
Урок 167.00:08:20
Parsing HTML Code Using Python
Урок 168.00:10:31
Extracting HTML Attributes
Урок 169.00:10:28
Posting Forms
Урок 170.00:11:25
Building Basic Structure For a Vulnerability Scanner
Урок 171.00:05:09
Using Default Parameters
Урок 172.00:09:17
Sending Requests in a Session
Урок 173.00:10:08
Extracting & Submitting Forms Automatically
Урок 174.00:06:09
Implementing a Method To Run The Scanner
Урок 175.00:09:08
Discovering XSS Vulnerabilities
Урок 176.00:05:09
Exploiting XSS Vulnerabilities
Урок 177.00:08:16
Implementing Code To Discover XSS in Forms
Урок 178.00:07:44
Implementing Code To Discover XSS in Parameters
Урок 179.00:08:47
Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
Could you update the course, please.
Thank so much for your efforts.