• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      • Home
      • All courses
      • Learn Python & Ethical Hacking From Scratch
      CoursesLearn Python & Ethical Hacking From Scratch
      • Introduction 9

        • Lecture1.1
          Teaser 07 min
        • Lecture1.2
          Course Introduction 06 min
        • Lecture1.3
          Introduction to Python Programming & Ethical Hacking 06 min
        • Lecture1.4
          Lab Overview & Needed Software 03 min
        • Lecture1.5
          Installing Kali 2020 as a virtual Machine 11 min
        • Lecture1.6
          Basic Overview of Kali Linux 05 min
        • Lecture1.7
          The Terminal & Linux Commands 11 min
        • Lecture1.8
          Python 2 VS Python 3 & Writing Our First Program 09 min
        • Lecture1.9
          Installing & Using a Python IDE 09 min
      • Writing a MAC Address Changer - Python Basics 13

        • Lecture2.1
          What is MAC Address & How To Change it 08 min
        • Lecture2.2
          Using Python Modules & Executing System Commands 09 min
        • Lecture2.3
          Implementing a Very Basic MAC Changer 05 min
        • Lecture2.4
          Variables & Strings 10 min
        • Lecture2.5
          Using Variables in MAC Changer 04 min
        • Lecture2.6
          Getting Input From The User 06 min
        • Lecture2.7
          Handling User Input 10 min
        • Lecture2.8
          Handling Command-line Arguments 10 min
        • Lecture2.9
          Initialising Variables Based on Command-line Arguments 08 min
        • Lecture2.10
          Python Functions 10 min
        • Lecture2.11
          Returning Values From Functions 07 min
        • Lecture2.12
          Decision Making in Python 07 min
        • Lecture2.13
          Using Conditional Statements in MAC Changer 09 min
      • MAC Changer - Algorithm Design 7

        • Lecture3.1
          Introduction to Algorithms 03 min
        • Lecture3.2
          Reading Output Returned By System Commands 06 min
        • Lecture3.3
          Introduction to Regular Expressions (Regex) 08 min
        • Lecture3.4
          Extracting a Substring Using Regex 07 min
        • Lecture3.5
          Refactoring & Housekeeping 11 min
        • Lecture3.6
          Implementing The Validation Algorithm 06 min
        • Lecture3.7
          Python 3 Compatibility 06 min
      • Programming a Network Scanner 16

        • Lecture4.1
          Introduction & Teaser 10 min
        • Lecture4.2
          Installing Windows as a Virtual Machine 03 min
        • Lecture4.3
          Introduction to ARP 10 min
        • Lecture4.4
          Designing an Algorithm To Discover Clients Connected To The Same Network 04 min
        • Lecture4.5
          Using Scapy To Create an ARP Request 07 min
        • Lecture4.6
          Combining Frames To Broadcast Packets 09 min
        • Lecture4.7
          Sending & Receiving Packets 07 min
        • Lecture4.8
          Introduction Lists in Python 08 min
        • Lecture4.9
          Iterating Over Lists & Analysing Packet 10 min
        • Lecture4.10
          Using Escape Characters To Enhance Program Output 06 min
        • Lecture4.11
          Introduction to Dictionaries in Python 10 min
        • Lecture4.12
          Improving the Program Using a List of Dictionaries 09 min
        • Lecture4.13
          Iterating Over Nested Data Structures 07 min
        • Lecture4.14
          Assignment 1: Get IP Range Using Command Line Arguments
        • Lecture4.15
          Assignment 1 (solution): Get IP Range Using Command Line Arguments – solution
        • Lecture4.16
          Testing The Network Scanner With Python 3 07 min
      • Writing an ARP Spoofer 13

        • Lecture5.1
          What is ARP Spoofing? 06 min
        • Lecture5.2
          Intercepting Data in a Network Using arpspoof 05 min
        • Lecture5.3
          Creating an ARP Response 07 min
        • Lecture5.4
          Sending ARP Responses 05 min
        • Lecture5.5
          Extracting MAC Address From Responses 07 min
        • Lecture5.6
          Introduction to Loops in Python 09 min
        • Lecture5.7
          More on Loops & Counters 08 min
        • Lecture5.8
          Dynamic Printing 07 min
        • Lecture5.9
          Exception Handling in Python 05 min
        • Lecture5.10
          Implementing a Restore Function 12 min
        • Lecture5.11
          Restoring ARP Tables When an Exception Occures 05 min
        • Lecture5.12
          Assignment 2: Fix Dynamic Printing
        • Lecture5.13
          Assignment 2 (solution): Fix Dynamic Printing
      • Writing a Packet Sniffer 8

        • Lecture6.1
          Introduction & Teaser 04 min
        • Lecture6.2
          Sniffing Packets Using Scapy 07 min
        • Lecture6.3
          Extracting data From a Specific Layer 07 min
        • Lecture6.4
          Analysing Sniffed Packets & Extracting Fields From Layers 11 min
        • Lecture6.5
          Analysing Fields & Extracting Passwords 11 min
        • Lecture6.6
          Extracting URLs 08 min
        • Lecture6.7
          Capturing Passwords From Any Computer Connected to the Same Network 08 min
        • Lecture6.8
          Strings & Bytes in Python 3 07 min
      • Writing a DNS Spoofer 9

        • Lecture7.1
          Intercepting Packets – Creating a Proxy 13 min
        • Lecture7.2
          Converting Packets to Scapy Packets 09 min
        • Lecture7.3
          Introduction to DNS Spoofing 07 min
        • Lecture7.4
          Filtering DNS Responses 06 min
        • Lecture7.5
          Analysing & Creating a Custom DNS Response 08 min
        • Lecture7.6
          Modifying Packets On The Fly 08 min
        • Lecture7.7
          Redirecting DNS Responses 06 min
        • Lecture7.8
          Assignment 3: Conversion Between Strings & Bytes
        • Lecture7.9
          Assignment 3 (solution): Conversion Between Strings & Bytes
      • Writing a File Interceptor 8

        • Lecture8.1
          Introduction & Teaser 04 min
        • Lecture8.2
          Filtering Traffic Based on the Port Used 09 min
        • Lecture8.3
          Analysing HTTP Requests 05 min
        • Lecture8.4
          Intercepting HTTP Requests 10 min
        • Lecture8.5
          Modifying HTTP Responses on The Fly 11 min
        • Lecture8.6
          Intercepting & Replacing Downloads on The Network 09 min
        • Lecture8.7
          Assignment 4: Testing The File Interceptor With Python 3
        • Lecture8.8
          Assignment 4 (solution): Testing The File Interceptor With Python 3
      • Writing a Code Injector 15

        • Lecture9.1
          Introduction & Teaser 01 min
        • Lecture9.2
          Analysing HTTP Responses 07 min
        • Lecture9.3
          Replacing a Substring Using Regex 07 min
        • Lecture9.4
          Decoding HTTP Responses 10 min
        • Lecture9.5
          Modifying HTTP Responses & Injecting Javascript Code in HTML Pages 09 min
        • Lecture9.6
          Refactoring & Housekeeping 08 min
        • Lecture9.7
          Debugging Issues in Python 06 min
        • Lecture9.8
          Using Groups & None-capturing Regex 09 min
        • Lecture9.9
          Recalculating Content Length 11 min
        • Lecture9.10
          Assignment 5: Test The Code Injector With Python 3
        • Lecture9.11
          Assignment 5 (solution): Test The Code Injector With Python 3 09 min
        • Lecture9.12
          BeEF Overview & Basic Hook Method 07 min
        • Lecture9.13
          Hooking Computers Using code_injector 05 min
        • Lecture9.14
          Basic BeEF Commands 04 min
        • Lecture9.15
          Delivering Malware Using BeEF 06 min
      • Bypassing HTTPS 4

        • Lecture10.1
          How to Bypass HTTPS 11 min
        • Lecture10.2
          Bypassing HTTPS & Sniffing Login Credentials 08 min
        • Lecture10.3
          Replacing Downloads on HTTPS Pages 11 min
        • Lecture10.4
          Injecting Code in HTTPS Pages 08 min
      • Writing an ARP Spoof Detector 3

        • Lecture11.1
          Running Python Programs on Windows 10 min
        • Lecture11.2
          Capturing & Analysing ARP Responses 07 min
        • Lecture11.3
          Detecting ARP Spoofing Attacks Using Python 08 min
      • Writing Malware 10

        • Lecture12.1
          Introduction & Teaser 02 min
        • Lecture12.2
          Execute System Command Payload 10 min
        • Lecture12.3
          Sending Emails Using Python 11 min
        • Lecture12.4
          Filtering Command Output Using Regex 10 min
        • Lecture12.5
          Stealing WiFi Passwords Saved on a Computer 09 min
        • Lecture12.6
          Downloading Files From Program 08 min
        • Lecture12.7
          Writing Files on Disk 11 min
        • Lecture12.8
          Password Recovery Basics 08 min
        • Lecture12.9
          Stealing Saved Passwords From Remote Computers 08 min
        • Lecture12.10
          Interacting With The File System 10 min
      • Writing Malware - Keylogger 8

        • Lecture13.1
          Introduction & Teaser 04 min
        • Lecture13.2
          Writing a Basic Local Keylogger Using Python 10 min
        • Lecture13.3
          Introduction to Global Variables 08 min
        • Lecture13.4
          Logging Special Keys 07 min
        • Lecture13.5
          Threading & Recursion 11 min
        • Lecture13.6
          Introduction Object Oriented Programming 15 min
        • Lecture13.7
          Constructor Methods & Instance Variables 08 min
        • Lecture13.8
          Logging Key-strikes and Reporting Them By Email 12 min
      • Writing Malware - Backdoors 21

        • Lecture14.1
          Introduction & Teaser 06 min
        • Lecture14.2
          Client – Server Communication & Connection Types 08 min
        • Lecture14.3
          Connecting Two Remote Computers Using Sockets 10 min
        • Lecture14.4
          Sending & Receiving Data Over TCP 05 min
        • Lecture14.5
          Executing System Commands Remotely 10 min
        • Lecture14.6
          Implementing a Server 09 min
        • Lecture14.7
          Implementing Skeleton For Server – Client Communication 07 min
        • Lecture14.8
          Refactoring – Creating a Listener Class 08 min
        • Lecture14.9
          Refactoring – Creating a Backdoor Class 06 min
        • Lecture14.10
          Serialisation – Theory 11 min
        • Lecture14.11
          Serialisation – Implementing Reliable Methods to Send & Receive Data Over TCP 08 min
        • Lecture14.12
          Serialisation – Reliably Sending & Receiving Data 06 min
        • Lecture14.13
          Sending Commands as List & Implementing Exit Command 08 min
        • Lecture14.14
          Interacting With the File System – Implementing “cd” Command 09 min
        • Lecture14.15
          Reading Files Using Python 07 min
        • Lecture14.16
          Writing Files Using Python 07 min
        • Lecture14.17
          Downloading Files From Hacked Computer 08 min
        • Lecture14.18
          Implementing Upload Functionality in Listener 08 min
        • Lecture14.19
          Implementing Upload Functionality in Backdoor 06 min
        • Lecture14.20
          Handling Unknown Exceptions 10 min
        • Lecture14.21
          Using the Backdoor to Hack Windows, Linux & OS X 12 min
      • Writing Malware - Packaging 15

        • Lecture15.1
          Introduction & Teaser 03 min
        • Lecture15.2
          Converting Python Programs To Windows Binary Executables 07 min
        • Lecture15.3
          Running Executables Silentely 07 min
        • Lecture15.4
          Installing Windows Pyinstaller on Linux 08 min
        • Lecture15.5
          Packaging Programs For Windows From Linux 08 min
        • Lecture15.6
          Introduction to Persistence 08 min
        • Lecture15.7
          Running Programs on Startup 15 min
        • Lecture15.8
          Creating a Basic Trojan Using Download & Execute Payload 10 min
        • Lecture15.9
          Creating a Trojan By Embedding Files In Program Code 08 min
        • Lecture15.10
          Bypassing Anti-Virus Programs – Theory 05 min
        • Lecture15.11
          Bypassing Anti-Virus Programs – Practical 09 min
        • Lecture15.12
          Adding an Icon to Generated Executables 05 min
        • Lecture15.13
          Spoofing File Extension 09 min
        • Lecture15.14
          Converting Python Programs To OS X Executables 09 min
        • Lecture15.15
          Converting Python Programs to Linux Executables 07 min
      • Website / Web Application Hacking 3

        • Lecture16.1
          Introduction & Teaser 07 min
        • Lecture16.2
          What is a Website 04 min
        • Lecture16.3
          How to Hack a Website 05 min
      • Website Hacking - Writing a Crawler 9

        • Lecture17.1
          Sending GET Requests To Web Servers 10 min
        • Lecture17.2
          Discovering Website Subdomains Using Python 12 min
        • Lecture17.3
          Discovering Hidden Paths in Websites 11 min
        • Lecture17.4
          Reading Response Content 06 min
        • Lecture17.5
          Extracting Useful Data From Response 07 min
        • Lecture17.6
          Filtering Rsults 07 min
        • Lecture17.7
          Extracting Unique Links & Storing Them In a List 07 min
        • Lecture17.8
          Recursively Discovering All Paths On a Target Website 09 min
        • Lecture17.9
          Testing The Crawler With Python 3 07 min
      • Writing a Program To Guess Login Information 4

        • Lecture18.1
          Sending Post Requests to Websites 12 min
        • Lecture18.2
          Guessing Login Information on Login Pages 09 min
        • Lecture18.3
          Assignment 6: Test The Program With Python 3
        • Lecture18.4
          Assignment 6 (solution): Test The Program With Python 3
      • Writing a Vulnerability Scanner 17

        • Lecture19.1
          Introduction & Teaser 02 min
        • Lecture19.2
          HTTP Requests – POST VS GET 07 min
        • Lecture19.3
          Parsing HTML Code Using Python 08 min
        • Lecture19.4
          Extracting HTML Attributes 10 min
        • Lecture19.5
          Posting Forms 10 min
        • Lecture19.6
          Building Basic Structure For Vulnerability Scanner 11 min
        • Lecture19.7
          Using Default Parameters 05 min
        • Lecture19.8
          Sending Requests in a Session 09 min
        • Lecture19.9
          Extracting & Submitting Forms Automatically 10 min
        • Lecture19.10
          Implementing a Method To Run The Scanner 06 min
        • Lecture19.11
          Discovering XSS Vulnerabilities
        • Lecture19.12
          Exploiting XSS Vulnerabilities
        • Lecture19.13
          Implementing Code To Discover XSS in Forms
        • Lecture19.14
          Implementing Code To Discover XSS in Parameters
        • Lecture19.15
          Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
        • Lecture19.16
          Assignment 7: Test The Vulnerability Scanner With Python 3
        • Lecture19.17
          Assignment 7 (solution): Test The Vulnerability Scanner With Python 3 05 min
      • Bonus Section 1

        • Lecture20.1
          Bonus Lecture – What’s Next??
        This content is protected, please login and enroll course to view this content!
        Prev Filtering Traffic Based on the Port Used
        Next Intercepting HTTP Requests

        “Everything related to ethical hacking

        & cyber security in one place.”

        Quick Links

        • Home
        • About Us
        • Hacking & Security
        • Contact
        • FAQ

        Services

        • Penetration Testing
        • Consulting
        • Code Review
        • One on one training
        • VPN
        • VIP Membership

        Company

        • About Us
        • Contact

        Support

        • FAQ
        • Forums

        Copyright © 2020 zSecurity Ltd. All rights reserved.

        • Privacy
        • Terms

        Contribute

        Share your knowledge with the world

        SUBMIT AN ARTICLE

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account

        Are you a member? Login now