1. Урок 1. 00:01:28
    Introduction
  2. Урок 2. 00:04:56
    Course Manual
  3. Урок 3. 00:00:46
    Hacking Lab Setup Introduction
  4. Урок 4. 00:02:11
    What is Virtual Machine
  5. Урок 5. 00:07:59
    Installing Virtualbox (Windows)
  6. Урок 6. 00:09:14
    Installing Virtualbox (MAC)
  7. Урок 7. 00:15:55
    Installing Kali Linux
  8. Урок 8. 00:13:54
    Installing Windows 10
  9. Урок 9. 00:09:20
    Snapshots
  10. Урок 10. 00:02:26
    Quick Reminder Before We Move On
  11. Урок 11. 00:00:18
    Hacking Lab Setup Outro
  12. Урок 12. 00:00:59
    Kali Linux 101 Introduction
  13. Урок 13. 00:07:58
    Kali Overview
  14. Урок 14. 00:14:07
    Linux Terminal
  15. Урок 15. 00:04:07
    Changing Kali Password
  16. Урок 16. 00:00:49
    Kali Linux 101 Outro
  17. Урок 17. 00:00:33
    Anonymity Online Introduction
  18. Урок 18. 00:05:08
    How Networks Work
  19. Урок 19. 00:03:43
    DNS Usage
  20. Урок 20. 00:09:19
    Changing DNS Servers
  21. Урок 21. 00:08:57
    Using VPN Books
  22. Урок 22. 00:00:38
    Anonymity Online Outro
  23. Урок 23. 00:01:11
    Dark Web Introduction
  24. Урок 24. 00:03:57
    What is Dark Web?
  25. Урок 25. 00:15:41
    Installing Tor On Kali
  26. Урок 26. 00:10:48
    Browsing Dark Web
  27. Урок 27. 00:00:42
    Dark Web Outro
  28. Урок 28. 00:01:18
    Network Pentesting Introduction
  29. Урок 29. 00:04:33
    What is Network Pentesting?
  30. Урок 30. 00:06:50
    Chipsets
  31. Урок 31. 00:08:24
    Connecting WiFi USB
  32. Урок 32. 00:05:20
    MAC Address
  33. Урок 33. 00:08:34
    Monitor vs Managed
  34. Урок 34. 00:00:39
    Network Pentesting Outro
  35. Урок 35. 00:00:41
    Gathering Information From Networks Introduction
  36. Урок 36. 00:08:09
    Network Sniffing
  37. Урок 37. 00:08:25
    Airodump Specific Target
  38. Урок 38. 00:08:51
    Deauthentication Attacks
  39. Урок 39. 00:03:05
    Realtime Deauth Attack
  40. Урок 40. 00:00:25
    Gathering Information From Networks Outro
  41. Урок 41. 00:00:37
    Wireless Attacks Introduction
  42. Урок 42. 00:05:11
    Encryption Models
  43. Урок 43. 00:12:34
    Cracking WEP
  44. Урок 44. 00:08:17
    Fake Authentication
  45. Урок 45. 00:08:12
    Packet Injection
  46. Урок 46. 00:02:51
    How WPA Works?
  47. Урок 47. 00:05:36
    Capturing Handshakes
  48. Урок 48. 00:04:15
    Creating Wordlists
  49. Урок 49. 00:02:30
    WPA Live Cracking
  50. Урок 50. 00:04:37
    Safe Routers
  51. Урок 51. 00:00:43
    Wireless Attacks Outro
  52. Урок 52. 00:00:59
    Post Connection Attacks Introduction
  53. Урок 53. 00:02:50
    Post Connection Settings
  54. Урок 54. 00:05:24
    Netdiscover
  55. Урок 55. 00:12:53
    nMap
  56. Урок 56. 00:04:57
    Man In The Middle
  57. Урок 57. 00:08:41
    Manual ARP Poison
  58. Урок 58. 00:15:20
    Man In The Middle Framework
  59. Урок 59. 00:04:37
    How Hackers Steal Passwords
  60. Урок 60. 00:07:02
    Breaking HTTPS
  61. Урок 61. 00:07:44
    Creating Web Server
  62. Урок 62. 00:05:54
    DNS Attacks
  63. Урок 63. 00:08:49
    Bettercap Installation
  64. Урок 64. 00:06:09
    ARP Attack
  65. Урок 65. 00:07:44
    Capturing Information
  66. Урок 66. 00:14:48
    Caplet Usage
  67. Урок 67. 00:06:45
    HSTS Settings
  68. Урок 68. 00:11:37
    Breaking HTTPS
  69. Урок 69. 00:08:01
    HSTS Downgrade Attempt
  70. Урок 70. 00:09:22
    Javascript Injection
  71. Урок 71. 00:07:21
    Wireshark Intro
  72. Урок 72. 00:12:10
    Wireshark Analysis
  73. Урок 73. 00:03:54
    How to Protect Yourself
  74. Урок 74. 00:00:30
    Post Connection Attacks Outro
  75. Урок 75. 00:01:19
    System Pentesting Introduction
  76. Урок 76. 00:03:02
    Gaining Access
  77. Урок 77. 00:06:55
    Installing Metasploitable
  78. Урок 78. 00:07:42
    Finding Vulnerabilities
  79. Урок 79. 00:09:25
    Exploiting First Vulnerability
  80. Урок 80. 00:05:47
    Exploiting Username Map Script
  81. Урок 81. 00:05:23
    Exploiting PostgreSQL Vulnerability
  82. Урок 82. 00:00:47
    System Pentesting Outro
  83. Урок 83. 00:01:08
    Attacks On Users Introduction
  84. Урок 84. 00:02:57
    Attacking to Users
  85. Урок 85. 00:07:12
    Installing Veil
  86. Урок 86. 00:05:46
    Veil Overview
  87. Урок 87. 00:06:43
    Creating First Backdoor
  88. Урок 88. 00:09:30
    Bypassing Antivirus Solutions
  89. Урок 89. 00:04:35
    Using Multi Handler
  90. Урок 90. 00:06:32
    Testing Backdoor
  91. Урок 91. 00:00:33
    Attacks On Users Outro
  92. Урок 92. 00:00:51
    Social Engineering Introduction
  93. Урок 93. 00:04:02
    What is Maltego?
  94. Урок 94. 00:08:01
    Maltego Overview
  95. Урок 95. 00:07:57
    Strategy
  96. Урок 96. 00:05:48
    Downloading Combiner
  97. Урок 97. 00:07:02
    Combining Files
  98. Урок 98. 00:06:49
    More Convincing File
  99. Урок 99. 00:06:21
    Messing With Characters
  100. Урок 100. 00:06:53
    Faking Mails
  101. Урок 101. 00:00:44
    Social Engineering Outro
  102. Урок 102. 00:00:50
    Social Media Security Introduction
  103. Урок 103. 00:08:50
    Instagram Brute Force Attacks
  104. Урок 104. 00:11:00
    Instagram Social Engineering
  105. Урок 105. 00:03:08
    How to Protect Ourselves
  106. Урок 106. 00:00:24
    Social Media Security Outro
  107. Урок 107. 00:00:50
    Beef Introduction
  108. Урок 108. 00:05:41
    What is Beef?
  109. Урок 109. 00:05:49
    Hooking Target
  110. Урок 110. 00:11:12
    Injection
  111. Урок 111. 00:03:37
    Taking Screenshots
  112. Урок 112. 00:03:58
    How Hackers Steal Facebook Passwords?
  113. Урок 113. 00:09:17
    Backdoor Delivery
  114. Урок 114. 00:02:35
    How to Protect Yourself?
  115. Урок 115. 00:00:29
    Beef Outro
  116. Урок 116. 00:00:36
    External Network Attacks Introduction
  117. Урок 117. 00:02:30
    How Outside Network Attacks Work?
  118. Урок 118. 00:07:16
    External Backdoor
  119. Урок 119. 00:04:47
    Port Forwarding
  120. Урок 120. 00:00:46
    External Network Attacks Outro
  121. Урок 121. 00:01:03
    Fake Game Website Attacks Introduction
  122. Урок 122. 00:07:23
    External Beef Attack
  123. Урок 123. 00:07:01
    Ubuntu Server Creation
  124. Урок 124. 00:11:57
    Creating Game Website
  125. Урок 125. 00:05:24
    Installing Beef
  126. Урок 126. 00:07:39
    Beef in Ubuntu
  127. Урок 127. 00:05:36
    Embedding JavaScript
  128. Урок 128. 00:07:00
    What is No IP?
  129. Урок 129. 00:03:15
    Hooking iPhone
  130. Урок 130. 00:03:11
    How to Stay Safe
  131. Урок 131. 00:00:30
    Fake Game Website Attacks Outro
  132. Урок 132. 00:00:33
    Post Hacking Sessions Introduction
  133. Урок 133. 00:07:17
    Meterpreter Sessions
  134. Урок 134. 00:04:56
    Migration
  135. Урок 135. 00:04:55
    Downloading Files
  136. Урок 136. 00:02:39
    Capturing Keylogs
  137. Урок 137. 00:09:03
    Sustaining The Session
  138. Урок 138. 00:00:19
    Post Hacking Sessions Outro
  139. Урок 139. 00:01:01
    Hacker Methodology Introduction
  140. Урок 140. 00:03:50
    Ethical Hacker's Steps
  141. Урок 141. 00:05:58
    Detailed Explanation of Methodology
  142. Урок 142. 00:00:39
    Hacker Methodology Outro
  143. Урок 143. 00:00:26
    Website Reconnaissance Introduction
  144. Урок 144. 00:05:01
    Website Pentesting Setup
  145. Урок 145. 00:08:39
    Maltego One More Time
  146. Урок 146. 00:05:29
    Netcraft
  147. Урок 147. 00:04:23
    Reverse DNS Lookup
  148. Урок 148. 00:04:02
    Whois Lookup
  149. Урок 149. 00:06:26
    Robots
  150. Урок 150. 00:05:53
    Subdomains
  151. Урок 151. 00:00:31
    Website Reconnaissance Outro
  152. Урок 152. 00:00:21
    Website Pentesting Introduction
  153. Урок 153. 00:06:08
    Code Execution Vulnerability
  154. Урок 154. 00:08:50
    Reverse TCP Commands
  155. Урок 155. 00:07:37
    File Upload Vulnerability
  156. Урок 156. 00:06:38
    File Inclusion
  157. Урок 157. 00:00:21
    Website Pentesting Outro
  158. Урок 158. 00:00:46
    Cross Site Scripting Introduction
  159. Урок 159. 00:03:33
    What is XSS?
  160. Урок 160. 00:04:04
    Reflected XSS
  161. Урок 161. 00:03:26
    Stored XSS
  162. Урок 162. 00:05:55
    Real Hacking with XSS
  163. Урок 163. 00:03:40
    How to Protect Yourself?
  164. Урок 164. 00:00:20
    Cross Site Scripting Outro
  165. Урок 165. 00:00:53
    SQL 101 Introduction
  166. Урок 166. 00:01:47
    Database and SQL
  167. Урок 167. 00:04:37
    Database Structure
  168. Урок 168. 00:05:51
    Adding a New Value
  169. Урок 169. 00:04:56
    Updating and Deleting Values
  170. Урок 170. 00:04:37
    Filtering
  171. Урок 171. 00:00:22
    SQL 101 Outro
  172. Урок 172. 00:00:49
    SQL Injection Introduction
  173. Урок 173. 00:05:31
    Metasploitable Databases
  174. Урок 174. 00:07:48
    Working with Mutillidae
  175. Урок 175. 00:05:22
    Vulnerability Test
  176. Урок 176. 00:04:02
    Post Method SQLi
  177. Урок 177. 00:04:09
    Get Method SQLi
  178. Урок 178. 00:03:27
    Every Password On Database
  179. Урок 179. 00:05:39
    Learning Database Name
  180. Урок 180. 00:05:17
    Finding Out More
  181. Урок 181. 00:04:21
    Retrieving Everything
  182. Урок 182. 00:00:27
    SQL Injection Outro
  183. Урок 183. 00:00:36
    Website Pentesting Tools Introduction
  184. Урок 184. 00:10:12
    Sqlmap
  185. Урок 185. 00:05:11
    Zap
  186. Урок 186. 00:05:01
    Zap Analysis
  187. Урок 187. 00:00:26
    Website Pentesting Tools Outro
  188. Урок 188. 00:00:41
    Ethical Hacking Certifications Introduction
  189. Урок 189. 00:02:29
    Options for Certification
  190. Урок 190. 00:06:38
    Certified Ethical Hacker
  191. Урок 191. 00:06:14
    OSCP
  192. Урок 192. 00:01:09
    Ethical Hacking Certifications Outro
  193. Урок 193. 00:00:44
    Python For Ethical Hacking Setup Introduction
  194. Урок 194. 00:13:01
    Anaconda Installation (Windows)
  195. Урок 195. 00:11:46
    Anaconda Installation (MAC)
  196. Урок 196. 00:00:24
    Python For Ethical Hacking Setup Outro
  197. Урок 197. 00:00:43
    Python Data Types & Structures Introduction
  198. Урок 198. 00:08:36
    Numbers
  199. Урок 199. 00:11:32
    Variables
  200. Урок 200. 00:04:09
    Downloading Notebooks
  201. Урок 201. 00:07:54
    String
  202. Урок 202. 00:13:58
    String Advanced
  203. Урок 203. 00:14:08
    Variable Attributes
  204. Урок 204. 00:10:55
    Lists
  205. Урок 205. 00:05:08
    Lists Advanced
  206. Урок 206. 00:11:42
    Dictionary
  207. Урок 207. 00:09:12
    Sets
  208. Урок 208. 00:05:51
    Tuples
  209. Урок 209. 00:04:09
    Boolean
  210. Урок 210. 00:00:57
    Python Data Types & Structures Outro
  211. Урок 211. 00:00:35
    Control Statements & Loops Introduction
  212. Урок 212. 00:06:31
    Logical Comparisons
  213. Урок 213. 00:08:35
    If Statements
  214. Урок 214. 00:09:53
    If Statements Continued
  215. Урок 215. 00:05:07
    If Statements Practical Usage
  216. Урок 216. 00:09:07
    For Loop
  217. Урок 217. 00:05:52
    For Loop Practical Usage
  218. Урок 218. 00:07:44
    Break Continue Pass
  219. Урок 219. 00:11:34
    While Loop
  220. Урок 220. 00:00:28
    Control Statements & Loops Outro
  221. Урок 221. 00:00:29
    Essentials Introduction
  222. Урок 222. 00:10:40
    Useful Methods
  223. Урок 223. 00:08:02
    Zip and Random
  224. Урок 224. 00:05:21
    Lists Advanced
  225. Урок 225. 00:07:09
    Sublime Text (Windows)
  226. Урок 226. 00:03:41
    Command Prompt (Windows)
  227. Урок 227. 00:06:20
    Sublime Text (MAC)
  228. Урок 228. 00:03:48
    Terminal (MAC)
  229. Урок 229. 00:00:32
    Essentials Outro
  230. Урок 230. 00:00:40
    Functions Introduction
  231. Урок 231. 00:09:10
    Functions Explained
  232. Урок 232. 00:11:39
    Input and Output
  233. Урок 233. 00:09:58
    Functions Advanced
  234. Урок 234. 00:10:54
    Functions Practical Usage
  235. Урок 235. 00:13:50
    Scope
  236. Урок 236. 00:00:26
    Functions Outro
  237. Урок 237. 00:00:28
    Object Oriented Programming Introduction
  238. Урок 238. 00:13:34
    Class
  239. Урок 239. 00:05:58
    Methods
  240. Урок 240. 00:07:07
    Class Practical Usage
  241. Урок 241. 00:07:38
    Inheritance
  242. Урок 242. 00:08:26
    Special Methods
  243. Урок 243. 00:11:06
    Error Handling
  244. Урок 244. 00:00:30
    Object Oriented Programming Outro
  245. Урок 245. 00:00:25
    Modules Introduction
  246. Урок 246. 00:12:39
    Using Libraries
  247. Урок 247. 00:05:54
    Writing Our Own Modules
  248. Урок 248. 00:06:55
    Imported vs Direct
  249. Урок 249. 00:00:23
    Modules Outro
  250. Урок 250. 00:00:49
    MAC Changer Introduction
  251. Урок 251. 00:16:17
    Installing PyCharm On Kali
  252. Урок 252. 00:06:45
    MAC and IP Address
  253. Урок 253. 00:07:49
    Changing MAC Manually
  254. Урок 254. 00:07:14
    Using Subprocess
  255. Урок 255. 00:09:43
    Introducing Variables
  256. Урок 256. 00:12:03
    Processing Tuples
  257. Урок 257. 00:08:02
    Beautifying the Code
  258. Урок 258. 00:05:00
    Saving Subprocess
  259. Урок 259. 00:06:47
    Regex 101
  260. Урок 260. 00:06:35
    New MAC Control
  261. Урок 261. 00:04:03
    Python3 Compatibility
  262. Урок 262. 00:00:25
    MAC Changer Outro
  263. Урок 263. 00:00:29
    Network Scanner Introduction
  264. Урок 264. 00:04:45
    ARP Refreshed
  265. Урок 265. 00:05:59
    How Network Scanners Work
  266. Урок 266. 00:09:48
    ARP Request
  267. Урок 267. 00:08:57
    Broadcast Request
  268. Урок 268. 00:05:33
    Processing Response
  269. Урок 269. 00:08:22
    Adding Features
  270. Урок 270. 00:00:52
    Python3 Compatibility
  271. Урок 271. 00:00:33
    Network Scanner Outro
  272. Урок 272. 00:00:37
    Man In The Middle Introduction
  273. Урок 273. 00:04:31
    MITM Refreshed
  274. Урок 274. 00:07:44
    ARP Response Creation
  275. Урок 275. 00:07:15
    ARP Poison
  276. Урок 276. 00:13:47
    Getting MAC Address
  277. Урок 277. 00:09:38
    Looping Continuously
  278. Урок 278. 00:04:03
    Displaying Better Logs
  279. Урок 279. 00:10:02
    Handling Specific Error
  280. Урок 280. 00:08:06
    Getting User Input
  281. Урок 281. 00:00:22
    Man In The Middle Outro
  282. Урок 282. 00:00:26
    Packet Listener Introduction
  283. Урок 283. 00:07:29
    Wireshark Refreshed
  284. Урок 284. 00:07:33
    Wireshark Analysis
  285. Урок 285. 00:08:42
    Gathering Packets
  286. Урок 286. 00:06:42
    Working With Layers
  287. Урок 287. 00:15:16
    Downgrading HTTPS
  288. Урок 288. 00:02:52
    Protecting Ourselves
  289. Урок 289. 00:00:36
    Packet Listener Outro
  290. Урок 290. 00:00:28
    Keylogger Introduction
  291. Урок 291. 00:13:35
    Setting Up Windows
  292. Урок 292. 00:13:55
    Working With Files
  293. Урок 293. 00:08:46
    Logging Keyboard
  294. Урок 294. 00:06:15
    Saving Logs
  295. Урок 295. 00:07:37
    Handling Errors
  296. Урок 296. 00:09:14
    Sending Email
  297. Урок 297. 00:08:53
    Reason Behind Threading
  298. Урок 298. 00:05:46
    Threading Library
  299. Урок 299. 00:04:17
    Testing On Windows
  300. Урок 300. 00:00:28
    Keylogger Outro
  301. Урок 301. 00:00:24
    Backdoor Introduction
  302. Урок 302. 00:06:43
    How To Write a Backdoor?
  303. Урок 303. 00:07:39
    Opening a Connection
  304. Урок 304. 00:08:36
    Running Commands
  305. Урок 305. 00:09:11
    Writing Listener
  306. Урок 306. 00:06:11
    Sending Commands With Listener
  307. Урок 307. 00:09:20
    Class Structure
  308. Урок 308. 00:05:38
    Finishing Classes
  309. Урок 309. 00:10:26
    What is JSON?
  310. Урок 310. 00:08:29
    Processing JSON
  311. Урок 311. 00:12:36
    Sending Commands With List
  312. Урок 312. 00:08:43
    Cd Command Implementation
  313. Урок 313. 00:07:00
    Getting Contents
  314. Урок 314. 00:06:19
    Saving Files
  315. Урок 315. 00:07:10
    Encoding Downloads
  316. Урок 316. 00:08:54
    Upload Functionality
  317. Урок 317. 00:07:11
    Handling Errors
  318. Урок 318. 00:12:14
    Python3 Compatibility
  319. Урок 319. 00:00:37
    Backdoor Outro
  320. Урок 320. 00:00:28
    Packaging & Malicious Files Introduction
  321. Урок 321. 00:06:01
    Malicious Files
  322. Урок 322. 00:05:28
    Creating Executables
  323. Урок 323. 00:06:35
    What is Regedit?
  324. Урок 324. 00:07:53
    Copying Files
  325. Урок 325. 00:05:32
    Running Executables On Startup
  326. Урок 326. 00:08:38
    Adding PDF to File
  327. Урок 327. 00:07:25
    Changing Icons
  328. Урок 328. 00:06:36
    Changing Extensions
  329. Урок 329. 00:00:37
    Packaging & Malicious Files Outro
  330. Урок 330. 00:02:39
    Closing