- Introduction 13
- TeaserLecture1.107 min
- Course IntroductionLecture1.207 min
- Introduction to Python Programming & Ethical HackingLecture1.306 min
- Initial OverviewLecture1.406 min
- Initial PreparationLecture1.509 min
- Installing Kali Linux as a VM on WindowsLecture1.609 min
- Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture1.709 min
- Installing Kali Linux as a VM on LinuxLecture1.811 min
- Basic Overview of Kali LinuxLecture1.905 min
- The Terminal & Linux CommandsLecture1.1010 min
- More Powerful Linux Terminals with AI FeaturesLecture1.1105 min
- Python 2 VS Python 3 & Writing Our First ProgramLecture1.1209 min
- Installing & Using a Python IDELecture1.1310 min
- Writing a MAC Address Changer - Python Basics 13
- What is MAC Address & How To Change itLecture2.108 min
- Using Python Modules & Executing System CommandsLecture2.209 min
- Implementing a Very Basic MAC ChangerLecture2.305 min
- Variables & StringsLecture2.410 min
- Using Variables in MAC ChangerLecture2.505 min
- Getting Input From The UserLecture2.606 min
- Handling User InputLecture2.710 min
- Handling Command-line ArgumentsLecture2.810 min
- Initialising Variables Based on Command-line ArgumentsLecture2.908 min
- Python FunctionsLecture2.1010 min
- Returning Values From FunctionsLecture2.1107 min
- Decision Making in PythonLecture2.1207 min
- Using Conditional Statements in MAC ChangerLecture2.1309 min
- MAC Changer - Algorithm Design 7
- Introduction to AlgorithmsLecture3.103 min
- Reading Output Returned By System CommandsLecture3.206 min
- Introduction to Regular Expressions (Regex)Lecture3.308 min
- Extracting a Substring Using RegexLecture3.407 min
- Refactoring & HousekeepingLecture3.511 min
- Implementing The Validation AlgorithmLecture3.606 min
- Python 3 CompatibilityLecture3.706 min
- Programming a Network Scanner 17
- Introduction & TeaserLecture4.110 min
- Installing Windows as a Virtual MachineLecture4.206 min
- Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture4.305 min
- Introduction to ARPLecture4.410 min
- Designing an Algorithm To Discover Clients Connected To The Same NetworkLecture4.504 min
- Using Scapy To Create an ARP RequestLecture4.607 min
- Combining Frames To Broadcast PacketsLecture4.710 min
- Sending & Receiving PacketsLecture4.807 min
- Introduction Lists in PythonLecture4.908 min
- Iterating Over Lists & Analysing PacketLecture4.1010 min
- Using Escape Characters To Enhance Program OutputLecture4.1106 min
- Introduction to Dictionaries in PythonLecture4.1210 min
- Improving the Program Using a List of DictionariesLecture4.1309 min
- Iterating Over Nested Data StructuresLecture4.1407 min
- Assignment 1: Get IP Range Using Command Line ArgumentsLecture4.15
- Assignment 1 (solution): Get IP Range Using Command Line Arguments – solutionLecture4.16
- Testing The Network Scanner With Python 3Lecture4.1705 min
- Writing an ARP Spoofer 13
- What is ARP Spoofing?Lecture5.106 min
- Intercepting Data in a Network Using arpspoofLecture5.205 min
- Creating an ARP ResponseLecture5.307 min
- Sending ARP ResponsesLecture5.406 min
- Extracting MAC Address From ResponsesLecture5.507 min
- Introduction to Loops in PythonLecture5.609 min
- More on Loops & CountersLecture5.708 min
- Dynamic PrintingLecture5.807 min
- Exception Handling in PythonLecture5.905 min
- Implementing a Restore FunctionLecture5.1012 min
- Restoring ARP Tables on ExceptionLecture5.1106 min
- Assignment 2: Fix Dynamic PrintingLecture5.12
- Assignment 2 (solution): Fix Dynamic PrintingLecture5.13
- Writing a Packet Sniffer 8
- Introduction & TeaserLecture6.105 min
- Sniffing Packets Using ScapyLecture6.207 min
- Extracting data From a Specific LayerLecture6.307 min
- Analysing Sniffed Packets & Extracting Fields From LayersLecture6.412 min
- Analysing Fields & Extracting PasswordsLecture6.511 min
- Extracting URLsLecture6.608 min
- Capturing Passwords From Any Computer Connected to the Same NetworkLecture6.708 min
- Strings & Bytes in Python 3Lecture6.807 min
- Writing a DNS Spoofer 9
- Intercepting Packets – Creating a ProxyLecture7.113 min
- Converting Packets to Scapy PacketsLecture7.209 min
- Introduction to DNS SpoofingLecture7.307 min
- Filtering DNS ResponsesLecture7.406 min
- Analysing & Creating a Custom DNS ResponseLecture7.508 min
- Modifying Packets On The FlyLecture7.608 min
- Redirecting DNS ResponsesLecture7.706 min
- Assignment 3: Conversion Between Strings & BytesLecture7.8
- Assignment 3 (solution): Conversion Between Strings & BytesLecture7.9
- Writing a File Interceptor 8
- Introduction & TeaserLecture8.104 min
- Filtering Traffic Based on the Port UsedLecture8.209 min
- Analysing HTTP RequestsLecture8.306 min
- Intercepting HTTP RequestsLecture8.410 min
- Modifying HTTP Responses on The FlyLecture8.511 min
- Intercepting & Replacing Downloads on The NetworkLecture8.610 min
- Assignment 4: Testing The File Interceptor With Python 3Lecture8.7
- Assignment 4 (solution): Testing The File Interceptor With Python 3Lecture8.8
- Writing a Code Injector 15
- Introduction & TeaserLecture9.101 min
- Analysing HTTP ResponsesLecture9.207 min
- Replacing a Substring Using RegexLecture9.307 min
- Decoding HTTP ResponsesLecture9.410 min
- Modifying HTTP Responses & Injecting Javascript Code in HTML PagesLecture9.509 min
- Refactoring & HousekeepingLecture9.608 min
- Debugging Issues in PythonLecture9.706 min
- Using Groups & None-capturing RegexLecture9.809 min
- Recalculating Content LengthLecture9.912 min
- Assignment 5: Test The Code Injector With Python 3Lecture9.10
- Assignment 5 (solution): Test The Code Injector With Python 3Lecture9.1109 min
- BeEF Overview & Basic Hook MethodLecture9.1207 min
- Hooking Computers Using code_injectorLecture9.1306 min
- Basic BeEF CommandsLecture9.1404 min
- Delivering Malware Using BeEFLecture9.1506 min
- Bypassing HTTPS 4
- How to Bypass HTTPSLecture10.111 min
- Bypassing HTTPS & Sniffing Login CredentialsLecture10.206 min
- Replacing Downloads on HTTPS PagesLecture10.308 min
- Injecting Code in HTTPS PagesLecture10.408 min
- Writing an ARP Spoof Detector 3
- Running Python Programs on WindowsLecture11.110 min
- Capturing & Analysing ARP ResponsesLecture11.207 min
- Detecting ARP Spoofing Attacks Using PythonLecture11.308 min
- Writing Malware 10
- Introduction & TeaserLecture12.102 min
- Execute System Command PayloadLecture12.210 min
- Sending Emails Using PythonLecture12.313 min
- Filtering Command Output Using RegexLecture12.410 min
- Stealing WiFi Passwords Saved on a ComputerLecture12.510 min
- Downloading Files Using PythonLecture12.608 min
- Writing Files on DiskLecture12.711 min
- Password Recovery BasicsLecture12.808 min
- Stealing Saved Passwords From Remote ComputersLecture12.908 min
- Interacting With The File System Using PythonLecture12.1010 min
- Writing Malware - Keylogger 8
- Introduction & TeaserLecture13.104 min
- Writing a Basic Local Keylogger Using PythonLecture13.210 min
- Introduction to Global VariablesLecture13.308 min
- Logging Special KeysLecture13.407 min
- Introduction to Threading & Recursion in PythonLecture13.511 min
- Introduction Object Oriented ProgrammingLecture13.615 min
- Constructor Methods & Instance VariablesLecture13.708 min
- Logging Key-strikes and Reporting Them By EmailLecture13.812 min
- Writing Malware - Backdoors 21
- Introduction & TeaserLecture14.106 min
- Client – Server Communication & Connection TypesLecture14.208 min
- Connecting Two Remote Computers Using SocketsLecture14.310 min
- Sending & Receiving Data Over TCPLecture14.405 min
- Executing System Commands RemotelyLecture14.510 min
- Implementing a ServerLecture14.609 min
- Implementing Skeleton For Server – Client CommunicationLecture14.707 min
- Refactoring – Creating a Listener ClassLecture14.808 min
- Refactoring – Creating a Backdoor ClassLecture14.906 min
- Serialisation – TheoryLecture14.1011 min
- Serialisation – Implementing Reliable Methods to Send & Receive Data Over TCPLecture14.1108 min
- Serialisation – Reliably Sending & Receiving DataLecture14.1206 min
- Sending Commands as List & Implementing Exit CommandLecture14.1308 min
- Interacting With the File System – Implementing “cd” CommandLecture14.1409 min
- Reading Files Using PythonLecture14.1508 min
- Writing Files Using PythonLecture14.1607 min
- Downloading Files From Hacked ComputerLecture14.1708 min
- Implementing Upload Functionality in ListenerLecture14.1808 min
- Implementing Upload Functionality in BackdoorLecture14.1906 min
- Handling Unknown ExceptionsLecture14.2010 min
- Using the Backdoor to Hack Windows, Linux & OS XLecture14.2113 min
- Writing Malware - Packaging 15
- Introduction & TeaserLecture15.103 min
- Converting Python Programs To Windows Binary ExecutablesLecture15.207 min
- Running Executables SilentlyLecture15.307 min
- Installing Windows Pyinstaller on LinuxLecture15.408 min
- Packaging Programs For Windows From LinuxLecture15.509 min
- Introduction to PersistenceLecture15.608 min
- Running Programs on StartupLecture15.715 min
- Creating a Basic Trojan Using Download & Execute PayloadLecture15.811 min
- Creating a Trojan By Embedding Files In Program CodeLecture15.909 min
- Bypassing Anti-Virus Programs – TheoryLecture15.1005 min
- Bypassing Anti-Virus Programs – PracticalLecture15.1109 min
- Adding an Icon to Generated ExecutablesLecture15.1205 min
- Spoofing File ExtensionLecture15.1310 min
- Converting Python Programs To OS X ExecutablesLecture15.1409 min
- Converting Python Programs to Linux ExecutablesLecture15.1507 min
- Website / Web Application Hacking 3
- Introduction & TeaserLecture16.107 min
- What is a WebsiteLecture16.204 min
- How to Hack a WebsiteLecture16.306 min
- Website Hacking - Writing a Crawler 9
- Sending GET Requests To Web ServersLecture17.110 min
- Discovering Website Subdomains Using PythonLecture17.212 min
- Discovering Hidden Paths in WebsitesLecture17.311 min
- Reading Response ContentLecture17.406 min
- Extracting Useful Data From ResponseLecture17.507 min
- Filtering ResultsLecture17.607 min
- Extracting Unique Links & Storing Them In a ListLecture17.707 min
- Recursively Discovering All Paths On a Target WebsiteLecture17.810 min
- Testing The Crawler With Python 3Lecture17.907 min
- Writing a Program To Guess Login Information 4
- Sending Post Requests to WebsitesLecture18.112 min
- Guessing Login Information on Login PagesLecture18.209 min
- Assignment 6: Test The Program With Python 3Lecture18.3
- Assignment 6 (solution): Test The Program With Python 3Lecture18.4
- Writing a Vulnerability Scanner 17
- Introduction & TeaserLecture19.103 min
- HTTP Requests – POST VS GETLecture19.207 min
- Parsing HTML Code Using PythonLecture19.308 min
- Extracting HTML AttributesLecture19.411 min
- Posting FormsLecture19.510 min
- Building Basic Structure For Vulnerability ScannerLecture19.611 min
- Using Default ParametersLecture19.705 min
- Sending Requests in a SessionLecture19.809 min
- Extracting & Submitting Forms AutomaticallyLecture19.910 min
- Implementing a Method To Run The ScannerLecture19.1006 min
- Discovering XSS VulnerabilitiesLecture19.1109 min
- Exploiting XSS VulnerabilitiesLecture19.1205 min
- Implementing Code To Discover XSS in FormsLecture19.1308 min
- Implementing Code To Discover XSS in ParametersLecture19.1408 min
- Automatically Discovering Vulnerabilities Using the Vulnerability ScannerLecture19.1509 min
- Assignment 7: Test The Vulnerability Scanner With Python 3Lecture19.16
- Assignment 7 (solution): Test The Vulnerability Scanner With Python 3Lecture19.1705 min
- Bonus Section 1
- Bonus Lecture – What’s Next??Lecture20.1
This content is protected, please login and enroll course to view this content!
