Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python For Ethical Hacking: Develop Pentesting Tools
Training Overview
Description of Training
Video Overview (5:16)
First Section
Introduction - Welcome to Python For Ethical Hacking! (5:16)
Setting Up Your Environment
VirtualBox 6.0.4 Installation (11:41)
Kali Linux 2019.1a Installation (17:07)
VirtualBox Guest Additions Installation (15:08)
Python In the Kali Terminal (13:33)
Developing A Port And Vulnerability Scanner
Port And Vulnerability Scanning - Making Simple Port scanner (15:33)
Port and Vulnerability Scanning - Adding Raw_input To Our Port scanner (9:24)
Port and Vulnerability Scanning - Scanning First 1000 Ports (4:47)
Port and Vulnerability Scanning - Coding Advance Port scanner - Part 1 (13:13)
Port and Vulnerability Scanning - Coding Advance Port scanner - Part 2 (8:51)
Port and Vulnerability Scanning - Finishing And Testing Advanced Port scanner (9:00)
Port and Vulnerability Scanning - Configuring IP Address (8:14)
Port and Vulnerability Scanning - Returning Banner From Open Port (14:46)
Port and Vulnerability Scanning - Developing A Vulnerability Scanner - Part 1 (11:57)
Port and Vulnerability Scanning - Developing A Vulnerability Scanner - Part 2 (7:20)
Developing Offensive SSH & FTP Attacks Scripts
SSH & FTP Attacks - Automating SSH Login - Part 1 (9:55)
SSH & FTP Attacks - Automating SSH Login - Part 2 (9:21)
SSH & FTP Attacks - Testing the SSH Login script (8:37)
SSH & FTP Attacks - Coding the SSH Bruteforcer (10:38)
SSH & FTP Attacks - Executing Commands On the Target (10:10)
SSH & FTP Attacks - Anonymous FTP Login Attack (9:55)
SSH & FTP Attacks - Username & Password Attack on FTP (17:32)
Password Cracking
Password Cracking - SHA256, SHA512, MD5 (8:37)
Password Cracking - Cracking SHA1 Hash With Online Dictionary (16:41)
Password Cracking - Getting Password From MD5 Hash (13:26)
Password Cracking - Cracking a Crypt Password With a Salt (24:02)
Developing Sniffing, Flooding & Spoofing Tools
Sniffers, Flooders, Spoofers - Changing MAC Address Manually (8:35)
Sniffers, Flooders, Spoofers - Coding a MAC Changer (17:00)
Sniffers, Flooders, Spoofers - Theory Behind ARP Spoofing (4:43)
Sniffers, Flooders, Spoofers - Crafting Malicious ARP Packet (19:28)
Sniffers, Flooders, Spoofers - Coding ARP Spoofer (13:33)
Sniffers, Flooders, Spoofers - Forwarding Packets & Restoring ARP Tables (8:07)
Sniffers, Flooders, Spoofers - Spoofing Our IP Address And Sending Messages With (12:02)
Sniffers, Flooders, Spoofers - Running SynFlooder With Changed Source IP Address (11:22)
Sniffers, Flooders, Spoofers - Getting Source & Desitination MAC Address From Re (24:46)
Sniffers, Flooders, Spoofers - Sniffing FTP Username & Password - Part 1 (8:12)
Sniffers, Flooders, Spoofers - Sniffing FTP Username & Password - Part 2 (12:12)
Sniffers, Flooders, Spoofers - Getting Passwords From HTTP Websites (14:04)
Developing A DNS Spoofer
Coding A DNS Spoofer - Cloning Any Webpage (10:36)
Coding A DNS Spoofer - Printing DNS Queries (10:01)
Coding A DNS Spoofer - Redirecting Responses To Cloned Page (16:48)
Coding A DNS Spoofer - Setting IP Table Rules & Running DNS Spoofer (10:40)
Network Analysis
Analyzing Ethernet Header (16:10)
Analyzing IP header - Part 1 (10:27)
Analyzing IP header - Part 2 (25:35)
Analyzing TCP Header (15:15)
Analyzing UDP Header (13:21)
Developing Multi-functional Reverse Shells
Theory Behind Socket programming (7:20)
Wine & Pyinstaller installation (7:45)
Setting up listener (8:19)
Establishing connection between target and server (6:32)
Implementing send & recv functions (11:30)
Executing commands on target system (11:44)
Importing JSON library to parse data (8:21)
Converting Python backdoor to .exe (8:15)
Using OS library to change directory (10:00)
Downloading & uploading files to target PC (19:07)
Hiding our backdoor and creating persistence (13:50)
Trying to connect to server every 20 seconds (7:55)
Downloading files to target PC (11:51)
Capturing screenshots on target PC (23:08)
Administrator privilege check (8:15)
Starting other programs with our shell (10:47)
Running our shell as an image, audio or PDF (20:09)
Developing A Keylogger
Installing Pynput (6:21)
Printing space character (8:50)
Calling timer on our keylogger (9:58)
Adding keylogger to our backdoor (13:00)
Creating A Custom Command And Control Center
What is a threaded server (5:07)
Accepting connections with a thread (13:14)
Managing multiple sessions (8:41)
Testing threaded server with Windows 10 target (9:05)
Fixing Q command (11:14)
Coding exit function (13:53)
Attacking multiple targets and gathering botnet (16:29)
Website Penetration Testing With Python
Stealing saved wireless passwords (22:00)
Bruteforcing Gmail (10:15)
Bruteforcing any login page - Part 1 (13:01)
Bruteforcing any login page - Part 2 (10:11)
Finding hidden directories - Part 1 (5:12)
Finding hidden directories - Part 2 (6:40)
Discovering subdomains (11:33)
Changing HTTP headers (14:00)
Starting basic and digest authentication bruteforcer (10:25)
Controlling threads (8:37)
Coding run function (10:10)
Printing usage and testing our program (12:38)
Taking a look at ransomware (8:22)
Sniffers, Flooders, Spoofers - Getting Source & Desitination MAC Address From Re
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock