- Introduction 13
- TeaserLecture1.107 min
 - Course IntroductionLecture1.207 min
 - Introduction to Python Programming & Ethical HackingLecture1.306 min
 - Initial OverviewLecture1.406 min
 - Initial PreparationLecture1.509 min
 - Installing Kali Linux as a VM on WindowsLecture1.609 min
 - Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture1.709 min
 - Installing Kali Linux as a VM on LinuxLecture1.811 min
 - Basic Overview of Kali LinuxLecture1.905 min
 - The Terminal & Linux CommandsLecture1.1010 min
 - More Powerful Linux Terminals with AI FeaturesLecture1.1105 min
 - Python 2 VS Python 3 & Writing Our First ProgramLecture1.1209 min
 - Installing & Using a Python IDELecture1.1310 min
 
 - Writing a MAC Address Changer - Python Basics 13
- What is MAC Address & How To Change itLecture2.108 min
 - Using Python Modules & Executing System CommandsLecture2.209 min
 - Implementing a Very Basic MAC ChangerLecture2.305 min
 - Variables & StringsLecture2.410 min
 - Using Variables in MAC ChangerLecture2.505 min
 - Getting Input From The UserLecture2.606 min
 - Handling User InputLecture2.710 min
 - Handling Command-line ArgumentsLecture2.810 min
 - Initialising Variables Based on Command-line ArgumentsLecture2.908 min
 - Python FunctionsLecture2.1010 min
 - Returning Values From FunctionsLecture2.1107 min
 - Decision Making in PythonLecture2.1207 min
 - Using Conditional Statements in MAC ChangerLecture2.1309 min
 
 - MAC Changer - Algorithm Design 7
- Introduction to AlgorithmsLecture3.103 min
 - Reading Output Returned By System CommandsLecture3.206 min
 - Introduction to Regular Expressions (Regex)Lecture3.308 min
 - Extracting a Substring Using RegexLecture3.407 min
 - Refactoring & HousekeepingLecture3.511 min
 - Implementing The Validation AlgorithmLecture3.606 min
 - Python 3 CompatibilityLecture3.706 min
 
 - Programming a Network Scanner 17
- Introduction & TeaserLecture4.110 min
 - Installing Windows as a Virtual MachineLecture4.206 min
 - Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture4.305 min
 - Introduction to ARPLecture4.410 min
 - Designing an Algorithm To Discover Clients Connected To The Same NetworkLecture4.504 min
 - Using Scapy To Create an ARP RequestLecture4.607 min
 - Combining Frames To Broadcast PacketsLecture4.710 min
 - Sending & Receiving PacketsLecture4.807 min
 - Introduction Lists in PythonLecture4.908 min
 - Iterating Over Lists & Analysing PacketLecture4.1010 min
 - Using Escape Characters To Enhance Program OutputLecture4.1106 min
 - Introduction to Dictionaries in PythonLecture4.1210 min
 - Improving the Program Using a List of DictionariesLecture4.1309 min
 - Iterating Over Nested Data StructuresLecture4.1407 min
 - Assignment 1: Get IP Range Using Command Line ArgumentsLecture4.15
 - Assignment 1 (solution): Get IP Range Using Command Line Arguments – solutionLecture4.16
 - Testing The Network Scanner With Python 3Lecture4.1705 min
 
 - Writing an ARP Spoofer 13
- What is ARP Spoofing?Lecture5.106 min
 - Intercepting Data in a Network Using arpspoofLecture5.205 min
 - Creating an ARP ResponseLecture5.307 min
 - Sending ARP ResponsesLecture5.406 min
 - Extracting MAC Address From ResponsesLecture5.507 min
 - Introduction to Loops in PythonLecture5.609 min
 - More on Loops & CountersLecture5.708 min
 - Dynamic PrintingLecture5.807 min
 - Exception Handling in PythonLecture5.905 min
 - Implementing a Restore FunctionLecture5.1012 min
 - Restoring ARP Tables on ExceptionLecture5.1106 min
 - Assignment 2: Fix Dynamic PrintingLecture5.12
 - Assignment 2 (solution): Fix Dynamic PrintingLecture5.13
 
 - Writing a Packet Sniffer 8
- Introduction & TeaserLecture6.105 min
 - Sniffing Packets Using ScapyLecture6.207 min
 - Extracting data From a Specific LayerLecture6.307 min
 - Analysing Sniffed Packets & Extracting Fields From LayersLecture6.412 min
 - Analysing Fields & Extracting PasswordsLecture6.511 min
 - Extracting URLsLecture6.608 min
 - Capturing Passwords From Any Computer Connected to the Same NetworkLecture6.708 min
 - Strings & Bytes in Python 3Lecture6.807 min
 
 - Writing a DNS Spoofer 9
- Intercepting Packets – Creating a ProxyLecture7.113 min
 - Converting Packets to Scapy PacketsLecture7.209 min
 - Introduction to DNS SpoofingLecture7.307 min
 - Filtering DNS ResponsesLecture7.406 min
 - Analysing & Creating a Custom DNS ResponseLecture7.508 min
 - Modifying Packets On The FlyLecture7.608 min
 - Redirecting DNS ResponsesLecture7.706 min
 - Assignment 3: Conversion Between Strings & BytesLecture7.8
 - Assignment 3 (solution): Conversion Between Strings & BytesLecture7.9
 
 - Writing a File Interceptor 8
- Introduction & TeaserLecture8.104 min
 - Filtering Traffic Based on the Port UsedLecture8.209 min
 - Analysing HTTP RequestsLecture8.306 min
 - Intercepting HTTP RequestsLecture8.410 min
 - Modifying HTTP Responses on The FlyLecture8.511 min
 - Intercepting & Replacing Downloads on The NetworkLecture8.610 min
 - Assignment 4: Testing The File Interceptor With Python 3Lecture8.7
 - Assignment 4 (solution): Testing The File Interceptor With Python 3Lecture8.8
 
 - Writing a Code Injector 15
- Introduction & TeaserLecture9.101 min
 - Analysing HTTP ResponsesLecture9.207 min
 - Replacing a Substring Using RegexLecture9.307 min
 - Decoding HTTP ResponsesLecture9.410 min
 - Modifying HTTP Responses & Injecting Javascript Code in HTML PagesLecture9.509 min
 - Refactoring & HousekeepingLecture9.608 min
 - Debugging Issues in PythonLecture9.706 min
 - Using Groups & None-capturing RegexLecture9.809 min
 - Recalculating Content LengthLecture9.912 min
 - Assignment 5: Test The Code Injector With Python 3Lecture9.10
 - Assignment 5 (solution): Test The Code Injector With Python 3Lecture9.1109 min
 - BeEF Overview & Basic Hook MethodLecture9.1207 min
 - Hooking Computers Using code_injectorLecture9.1306 min
 - Basic BeEF CommandsLecture9.1404 min
 - Delivering Malware Using BeEFLecture9.1506 min
 
 - Bypassing HTTPS 4
- How to Bypass HTTPSLecture10.111 min
 - Bypassing HTTPS & Sniffing Login CredentialsLecture10.206 min
 - Replacing Downloads on HTTPS PagesLecture10.308 min
 - Injecting Code in HTTPS PagesLecture10.408 min
 
 - Writing an ARP Spoof Detector 3
- Running Python Programs on WindowsLecture11.110 min
 - Capturing & Analysing ARP ResponsesLecture11.207 min
 - Detecting ARP Spoofing Attacks Using PythonLecture11.308 min
 
 - Writing Malware 10
- Introduction & TeaserLecture12.102 min
 - Execute System Command PayloadLecture12.210 min
 - Sending Emails Using PythonLecture12.313 min
 - Filtering Command Output Using RegexLecture12.410 min
 - Stealing WiFi Passwords Saved on a ComputerLecture12.510 min
 - Downloading Files Using PythonLecture12.608 min
 - Writing Files on DiskLecture12.711 min
 - Password Recovery BasicsLecture12.808 min
 - Stealing Saved Passwords From Remote ComputersLecture12.908 min
 - Interacting With The File System Using PythonLecture12.1010 min
 
 - Writing Malware - Keylogger 8
- Introduction & TeaserLecture13.104 min
 - Writing a Basic Local Keylogger Using PythonLecture13.210 min
 - Introduction to Global VariablesLecture13.308 min
 - Logging Special KeysLecture13.407 min
 - Introduction to Threading & Recursion in PythonLecture13.511 min
 - Introduction Object Oriented ProgrammingLecture13.615 min
 - Constructor Methods & Instance VariablesLecture13.708 min
 - Logging Key-strikes and Reporting Them By EmailLecture13.812 min
 
 - Writing Malware - Backdoors 21
- Introduction & TeaserLecture14.106 min
 - Client – Server Communication & Connection TypesLecture14.208 min
 - Connecting Two Remote Computers Using SocketsLecture14.310 min
 - Sending & Receiving Data Over TCPLecture14.405 min
 - Executing System Commands RemotelyLecture14.510 min
 - Implementing a ServerLecture14.609 min
 - Implementing Skeleton For Server – Client CommunicationLecture14.707 min
 - Refactoring – Creating a Listener ClassLecture14.808 min
 - Refactoring – Creating a Backdoor ClassLecture14.906 min
 - Serialisation – TheoryLecture14.1011 min
 - Serialisation – Implementing Reliable Methods to Send & Receive Data Over TCPLecture14.1108 min
 - Serialisation – Reliably Sending & Receiving DataLecture14.1206 min
 - Sending Commands as List & Implementing Exit CommandLecture14.1308 min
 - Interacting With the File System – Implementing “cd” CommandLecture14.1409 min
 - Reading Files Using PythonLecture14.1508 min
 - Writing Files Using PythonLecture14.1607 min
 - Downloading Files From Hacked ComputerLecture14.1708 min
 - Implementing Upload Functionality in ListenerLecture14.1808 min
 - Implementing Upload Functionality in BackdoorLecture14.1906 min
 - Handling Unknown ExceptionsLecture14.2010 min
 - Using the Backdoor to Hack Windows, Linux & OS XLecture14.2113 min
 
 - Writing Malware - Packaging 15
- Introduction & TeaserLecture15.103 min
 - Converting Python Programs To Windows Binary ExecutablesLecture15.207 min
 - Running Executables SilentlyLecture15.307 min
 - Installing Windows Pyinstaller on LinuxLecture15.408 min
 - Packaging Programs For Windows From LinuxLecture15.509 min
 - Introduction to PersistenceLecture15.608 min
 - Running Programs on StartupLecture15.715 min
 - Creating a Basic Trojan Using Download & Execute PayloadLecture15.811 min
 - Creating a Trojan By Embedding Files In Program CodeLecture15.909 min
 - Bypassing Anti-Virus Programs – TheoryLecture15.1005 min
 - Bypassing Anti-Virus Programs – PracticalLecture15.1109 min
 - Adding an Icon to Generated ExecutablesLecture15.1205 min
 - Spoofing File ExtensionLecture15.1310 min
 - Converting Python Programs To OS X ExecutablesLecture15.1409 min
 - Converting Python Programs to Linux ExecutablesLecture15.1507 min
 
 - Website / Web Application Hacking 3
- Introduction & TeaserLecture16.107 min
 - What is a WebsiteLecture16.204 min
 - How to Hack a WebsiteLecture16.306 min
 
 - Website Hacking - Writing a Crawler 9
- Sending GET Requests To Web ServersLecture17.110 min
 - Discovering Website Subdomains Using PythonLecture17.212 min
 - Discovering Hidden Paths in WebsitesLecture17.311 min
 - Reading Response ContentLecture17.406 min
 - Extracting Useful Data From ResponseLecture17.507 min
 - Filtering ResultsLecture17.607 min
 - Extracting Unique Links & Storing Them In a ListLecture17.707 min
 - Recursively Discovering All Paths On a Target WebsiteLecture17.810 min
 - Testing The Crawler With Python 3Lecture17.907 min
 
 - Writing a Program To Guess Login Information 4
- Sending Post Requests to WebsitesLecture18.112 min
 - Guessing Login Information on Login PagesLecture18.209 min
 - Assignment 6: Test The Program With Python 3Lecture18.3
 - Assignment 6 (solution): Test The Program With Python 3Lecture18.4
 
 - Writing a Vulnerability Scanner 17
- Introduction & TeaserLecture19.103 min
 - HTTP Requests – POST VS GETLecture19.207 min
 - Parsing HTML Code Using PythonLecture19.308 min
 - Extracting HTML AttributesLecture19.411 min
 - Posting FormsLecture19.510 min
 - Building Basic Structure For Vulnerability ScannerLecture19.611 min
 - Using Default ParametersLecture19.705 min
 - Sending Requests in a SessionLecture19.809 min
 - Extracting & Submitting Forms AutomaticallyLecture19.910 min
 - Implementing a Method To Run The ScannerLecture19.1006 min
 - Discovering XSS VulnerabilitiesLecture19.1109 min
 - Exploiting XSS VulnerabilitiesLecture19.1205 min
 - Implementing Code To Discover XSS in FormsLecture19.1308 min
 - Implementing Code To Discover XSS in ParametersLecture19.1408 min
 - Automatically Discovering Vulnerabilities Using the Vulnerability ScannerLecture19.1509 min
 - Assignment 7: Test The Vulnerability Scanner With Python 3Lecture19.16
 - Assignment 7 (solution): Test The Vulnerability Scanner With Python 3Lecture19.1705 min
 
 - Bonus Section 1
- Bonus Lecture – What’s Next??Lecture20.1
 
 
This content is protected, please login and enroll course to view this content!
