1: Introduction
7minThis transcript is also available as a PDF download within the files tab.
Introduction
Hello and welcome. My name is Zaid. I’m an ethical hacker, a computer scientist and I’ll be your instructor in this course.
This course is going to be highly practical but it won’t neglect the theory, so we’ll start by covering some terminology. Then I’m going to show you how to install the needed software in order to write Python programmes and practice hacking safely. Throughout the course, we’re going to learn by example, so we’ll never have any boring plain program and lectures. We will always be building something exciting and I’m going to teach you programming as we build these exciting programs. The first program we’ll write is a MAC changer. This is a very simple program that can be used to change the MAC address. Don’t worry if you don’t know what a MAC address is or why you’d want to change it. We will cover all of that later on.
Basically, the whole point of writing this program is to introduce you to python basics such as writing functions, variables, handling, user input, rejects and so on. In here, you’ll learn how to properly model a problem, write an algorithm to solve this problem, and then write python code to implement this solution. Once we have the basics covered, we’re going to start writing a little bit more complex programs, so we’ll start with a network scanner, which as a program that can discover all clients connected to the same network and display their IP address and mark address. In here, I’m going to introduce you to escape and I’m going to teach you how to send and receive RFP responses and analyze them. I will also introduce you to dictionaries and lists and we’ll see how to use them and all the operations that we can invoke on them.
Next we’ll dive deeper into networking. We’re going to learn what arp is, what it’s used for, what is arp spoofing, and how to write a python program to run an Erp spoofing attack. As we do this, you’ll learn more about KP, analyzing network layers, handling exceptions, noobs and more. Then we’re going to die even deeper and networking. So you’re going to learn how to sniff data sent or received by any computer connected to the same network as us. This means we’ll be able to see visited websites, login information, passwords, and pretty much everything they do on the Internet. You’ll also learn how to analyze data sent in the different layers in each pocket and how to modify this data. So we’ll be able to inject and HTML pages loaded by any computer on the same network. We’ll be able to replace downloads and even spoof DNS requests to any destination we want.
We’ll learn all of this by writing a sniffer at the end as poor for a code injector and a file interceptor. Once done with all of this, we’ll move to a really exciting section where you’ll learn how to write malware. We’ll start with writing simple evil programs, so programs that can download the file, execute code, sent a report by email, and then I’m going to show you how to combine all of these programs to suit different scenarios and execute powerful attacks. Then we’re going to advance into writing more complex malware and we’ll start by writing a backdoor. A backdoor is a program that gives you full control over the system that it gets executed on. We’re going to implement this using sockets and you’re going to learn how to establish a connection between two devices and transfer data between them. This is very useful because it can be used in so many other scenarios other than hacking so you can use it to create a web server, a chat program and so on.
Then we’re going to build more cool features in this back door so that we can use it to execute system commands remotely on the target computer, download and upload files and maintain our access even if the system restarts. Then we will implement a key logger, which is a program that registers every keystroke entered on the keyboard and send us a report by email. As we do this, I’m going to teach you about recursive functions, threading on object-oriented programming. In the last part of the section, I’m going to show you how to package all of the programs that we built so far so that they can run on any operating system on windows, os x and Lennox. Not only that, but I’m also going to show you how to convert these programs into Trojans, so the look and function just like any other file type, like an image or a pdf. Finally, we’ll move to the website tracking section where you learn how websites work and how to communicate with websites, use in python, and then we’ll build a number of information gathering programs that can be used to discover files, directories, and subdomains. Then we’re going to write a program that can be used to guest the login information of any login page. As we do this, you’re going to learn how to read the HTML code of any webpage, analyze it, and extract the useful parts from it.
Finally, we’re going to build a genetic vulnerability scanner. This is a program that takes a website as an input and scans the whole website for weaknesses and vulnerabilities. Once done, it’s going to show us our report of all the discoveries and we’re going to write this program in a way so that it can discover any type of vulnerability. As we write this, you’re going to learn more about object-oriented programming and how to structure your program in a way so that it can be easily extended.
-
Introduction
-
Arp-spoof
-
BypassAVDynamics
-
Evading AV
-
Evil Files
-
Files and dirs wordlist
-
Interceptor
-
Mac-changer
-
Network scaner
-
Passwords
-
Sniffer
-
Website Hacking
-
Subdomains wordlist
You must Login to access notes.
All videos in this course
Lessons
- log in to buy this course and get access 1: Introduction 7min
- log in to buy this course and get access 2: What is Programming, What is Hacking & Why Learn Them (Preview) 6min
- log in to buy this course and get access 3: Lab Overview & Needed Software 8min
- log in to buy this course and get access 4: Installing Kali 2019 as a virtual Machine 10min
- log in to buy this course and get access 5: Basic Overview of Kali Linux 5min
- log in to buy this course and get access 6: The Terminal & Linux Commands 11min
- log in to buy this course and get access 7: Python 2 VS Python 3 & Writing Our First Program 9min
- log in to buy this course and get access 8: Installing & Using a Python IDE 9min
- log in to buy this course and get access 9: What is MAC Address & How To Change it 8min
- log in to buy this course and get access 10: Using Python Modules & Executing System Commands (Preview) 9min
- log in to buy this course and get access 11: Implementing a Very Basic MAC Changer (Preview) 5min
- log in to buy this course and get access 12: Variables & Strings 10min
- log in to buy this course and get access 13: Using Variables in MAC Changer 4min
- log in to buy this course and get access 14: Getting Input From The User 10min
- log in to buy this course and get access 15: Handling User Input (Preview) 10min
- log in to buy this course and get access 16: Handling Command-line Arguments 10min
- log in to buy this course and get access 17: Initialising Variables Based on Command-line Arguments 8min
- log in to buy this course and get access 18: Functions 10min
- log in to buy this course and get access 19: Returning Values From Functions 7min
- log in to buy this course and get access 20: Decision Making - Theory 7min
- log in to buy this course and get access 21: Using Conditional Statements in MAC Changer 9min
- log in to buy this course and get access 22: What is an Algorithm 3min
- log in to buy this course and get access 23: Reading Output Returned By System Commands 6min
- log in to buy this course and get access 24: Regular Expressions (Regex) 8min
- log in to buy this course and get access 25: Extracting a Substring Using Regex 6min
- log in to buy this course and get access 26: Refactoring & Housekeeping 11min
- log in to buy this course and get access 27: Implementing The Algorithm to Check The Mac Did Change (Preview) 6min
- log in to buy this course and get access 28: Programming a Network Scanner - Introduction & Teaser 10min
- log in to buy this course and get access 29: Installing Windows as a Virtual Machine 4min
- log in to buy this course and get access 30: What is ARP & What its Used For? 10min
- log in to buy this course and get access 31: Designing an Algorithm To Discover Clients Connected To The Same Network 4min
- log in to buy this course and get access 32: Using Scapy To Create an ARP Request 7min
- log in to buy this course and get access 33: Combining Frames To Broadcast Packets 9min
- log in to buy this course and get access 34: Sending & Receiving Packets 7min
- log in to buy this course and get access 35: Lists 8min
- log in to buy this course and get access 36: Iterating Over Lists & Analysing Packet 10min
- log in to buy this course and get access 37: Using Escape Characters To Enhance Program Output 6min
- log in to buy this course and get access 38: Dictionaries 9min
- log in to buy this course and get access 39: Improving the Program Using a List of Dictionaries 9min
- log in to buy this course and get access 40: Iterating Over Nested Data Structures 7min
- log in to buy this course and get access 41: Python 3 Compatibility 7min
- log in to buy this course and get access 42: What is ARP Spoofing? 6min
- log in to buy this course and get access 43: Redirecting the Flow of Packets in a Network Using arpspoof 5min
- log in to buy this course and get access 44: Creating an ARP Response 7min
- log in to buy this course and get access 45: Sending ARP Responses 5min
- log in to buy this course and get access 46: Extracting MAC Address From Responses 7min
- log in to buy this course and get access 47: Loops 9min
- log in to buy this course and get access 48: More on Loops & Counters 8min
- log in to buy this course and get access 49: Dynamic Printing 7min
- log in to buy this course and get access 50: Handling Exceptions 5min
- log in to buy this course and get access 51: Implementing a Restore Function 12min
- log in to buy this course and get access 52: Restoring ARP Tables When an Exception Occures 6min
- log in to buy this course and get access 53: Writing a Packet Sniffer - Introduction & Teaser 5min
- log in to buy this course and get access 54: Sniffing Packets Using Scapy 7min
- log in to buy this course and get access 55: Extracting data From a Specific Layer 7min
- log in to buy this course and get access 56: Analysing Sniffed Packets & Extracting Fields From Layers 12min
- log in to buy this course and get access 57: Analysing Fields & Extracting Passwords 11min
- log in to buy this course and get access 58: Extracting URLs 8min
- log in to buy this course and get access 59: Capturing Passwords From Any Computer Connected to the Same Network 8min
- log in to buy this course and get access 60: Intercepting Packets - Creating a Proxy 13min
- log in to buy this course and get access 61: Converting Packets to Scapy Packets 9min
- log in to buy this course and get access 62: What is DNS Spoofing 7min
- log in to buy this course and get access 63: Filtering DNS Responses 6min
- log in to buy this course and get access 64: Analysing & Creating a Custom DNS Response 8min
- log in to buy this course and get access 65: Modifying Packets On The Fly 8min
- log in to buy this course and get access 66: Redirecting DNS Responses (Preview) 6min
- log in to buy this course and get access 67: Writing a File Interceptor - Introduction & Teaser (Preview) 4min
- log in to buy this course and get access 68: Filtering Traffic Based on the Port Used 9min
- log in to buy this course and get access 69: Analysing HTTP Requests 5min
- log in to buy this course and get access 70: Intercepting HTTP Requests 10min
- log in to buy this course and get access 71: Modifying HTTP Responses on The Fly 11min
- log in to buy this course and get access 72: Intercepting & Replacing Downloads on The Network (Preview) 9min
- log in to buy this course and get access 73: Writing a Code Injector - Introduction & Teaser (Preview) 1min
- log in to buy this course and get access 74: Analysing HTTP Responses 7min
- log in to buy this course and get access 75: Replacing a Substring Using Regex 7min
- log in to buy this course and get access 76: Decoding HTTP Responses 10min
- log in to buy this course and get access 77: Modifying HTTP Responses & Injecting Javascript Code in HTML Pages 9min
- log in to buy this course and get access 78: Refactoring & Housekeeping 8min
- log in to buy this course and get access 79: Debugging Issues 6min
- log in to buy this course and get access 80: Using Groups & None-capturing Regex 6min
- log in to buy this course and get access 81: Recalculating Content Length 11min
- log in to buy this course and get access 82: BeEF Overview & Basic Hook Method 7min
- log in to buy this course and get access 83: Hooking Computers Using code_injector 5min
- log in to buy this course and get access 84: Basic BeEF Commands 4min
- log in to buy this course and get access 85: Delivering Malware Using BeEF 6min
- log in to buy this course and get access 86: How to Bypass HTTPS (Preview) 10min
- log in to buy this course and get access 87: Bypassing HTTPS & Sniffing Login Credentials 8min
- log in to buy this course and get access 88: Replacing Downloads on HTTPS Pages 11min
- log in to buy this course and get access 89: Injecting Code in HTTPS Pages 8min
- log in to buy this course and get access 90: Running Python Programs on Windows 10min
- log in to buy this course and get access 91: Capturing & Analysing ARP Responses 7min
- log in to buy this course and get access 92: Detecting ARP Spoofing Attacks 8min
- log in to buy this course and get access 93: Writing Malware - Introduction & Teaser 2min
- log in to buy this course and get access 94: Execute System Command Payload 10min
- log in to buy this course and get access 95: Sending Reports By Email 11min
- log in to buy this course and get access 96: Filtering Command Output Using Regex 10min
- log in to buy this course and get access 97: Stealing WiFi Passwords Saved on a Computer 9min
- log in to buy this course and get access 98: Downloading Files From Program 8min
- log in to buy this course and get access 99: Writing Files on Disk 11min
- log in to buy this course and get access 100: Password Recovery Basics 8min
- log in to buy this course and get access 101: Using all the Above to Steal Saved Passwords Remotely 8min
- log in to buy this course and get access 102: Interacting With The File System 11min
- log in to buy this course and get access 103: Writing Malware: Keylogger -Introduction & Teaser (Preview) 4min
- log in to buy this course and get access 104: Writing a Basic Local Keylogger 10min
- log in to buy this course and get access 105: Global Variables 8min
- log in to buy this course and get access 106: Logging Special Keys 7min
- log in to buy this course and get access 107: Threading & Recursion 11min
- log in to buy this course and get access 108: OOP - Object Oriented Programming Basics 15min
- log in to buy this course and get access 109: Constructor Methods & Instance Variables 8min
- log in to buy this course and get access 110: Logging Key-strikes and Reporting Them By Email 12min
- log in to buy this course and get access 111: Writing Malware: Backdoors - Introduction & Teaser 6min
- log in to buy this course and get access 112: Client - Server Communication & Connection Types 8min
- log in to buy this course and get access 113: Connecting Two Remote Computers Using Sockets 10min
- log in to buy this course and get access 114: Sending & Receiving Data Over TCP 5min
- log in to buy this course and get access 115: Executing System Commands Remotely 10min
- log in to buy this course and get access 116: Implementing a Server 9min
- log in to buy this course and get access 117: Implementing Skeleton For Server - Client Communication 7min
- log in to buy this course and get access 118: Refactoring - Creating a Listener Class 8min
- log in to buy this course and get access 119: Refactoring - Creating a Backdoor Class 6min
- log in to buy this course and get access 120: Serialisation - Theory 11min
- log in to buy this course and get access 121: Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP 8min
- log in to buy this course and get access 122: Serialisation - Reliably Sending & Receiving Data 6min
- log in to buy this course and get access 123: Sending Commands as List & Implementing Exit Command 8min
- log in to buy this course and get access 124: Interacting With the File System - Implementing "cd" Command 9min
- log in to buy this course and get access 125: Reading Files 7min
- log in to buy this course and get access 126: Writing Files 7min
- log in to buy this course and get access 127: Downloading Files From Hacked Computer 8min
- log in to buy this course and get access 128: Implementing Upload Functionality in Listener 8min
- log in to buy this course and get access 129: Implementing Upload Functionality in Backdoor 6min
- log in to buy this course and get access 130: Handling Unknown Exceptions 9min
- log in to buy this course and get access 131: Using the Backdoor to Hack Windows, Linux & OS X 12min
- log in to buy this course and get access 132: Writing Malware: Packaging - Introduction & Teaser (Preview) 3min
- log in to buy this course and get access 133: Converting Python Programs To Windows Binary Executables 7min
- log in to buy this course and get access 134: Running Executables Silentely 7min
- log in to buy this course and get access 135: Installing Windows Pyinstaller on Linux 8min
- log in to buy this course and get access 136: Packaging Programs For Windows From Linux 8min
- log in to buy this course and get access 137: Persistence Idea 8min
- log in to buy this course and get access 138: Running Programs on Startupesson 15min
- log in to buy this course and get access 139: Creating a Basic Trojan Using Download & Execute Payload 10min
- log in to buy this course and get access 140: Creating a Trojan By Embedding Files In Program Code 8min
- log in to buy this course and get access 141: Bypassing Anti-Virus Programs - Theory 5min
- log in to buy this course and get access 142: Bypassing Anti-Virus Programs - Practical 9min
- log in to buy this course and get access 143: Adding an Icon to Generated Executables 5min
- log in to buy this course and get access 144: Spoofing File Extension 9min
- log in to buy this course and get access 145: Converting Python Programs To OS X Executables 9min
- log in to buy this course and get access 146: Converting Python Programs to Linux Executables 7min
- log in to buy this course and get access 147: Website / Web Application Hacking - Introduction & Teaser 7min
- log in to buy this course and get access 148: What is a Website 4min
- log in to buy this course and get access 149: How to Hack a Website 5min
- log in to buy this course and get access 150: Sending GET Requests To Web Servers 10min
- log in to buy this course and get access 151: Discovering Subdomains 11min
- log in to buy this course and get access 152: Discovering Hidden Paths in Websites 11min
- log in to buy this course and get access 153: Reading Response Content 6min
- log in to buy this course and get access 154: Extracting Useful Data From Response 7min
- log in to buy this course and get access 155: Filtering Results 7min
- log in to buy this course and get access 156: Extracting Unique Links & Storing Them In a List 7min
- log in to buy this course and get access 157: Recursively Discovering All Paths On a Target Website 10min
- log in to buy this course and get access 158: Sending Post Requests to Websites 12min
- log in to buy this course and get access 159: Guessing Login Information on Login Pages 9min
- log in to buy this course and get access 160: Writing a Vulnerability Scanner - Introduction & Teaser 3min
- log in to buy this course and get access 161: HTTP Requests - POST VS GET 7min
- log in to buy this course and get access 162: Parsing HTML Code 8min
- log in to buy this course and get access 163: Extracting HTML Attributes 10min
- log in to buy this course and get access 164: Posting Forms 10min
- log in to buy this course and get access 165: Building Basic Structure For Vulnerability Scanner 11min
- log in to buy this course and get access 166: Using Default Parameters 5min
- log in to buy this course and get access 167: Sending Requests in a Session 9min
- log in to buy this course and get access 168: Extracting & Submitting Forms Automatically 10min
- log in to buy this course and get access 169: Implementing a Method To Run The Scanner 6min
- log in to buy this course and get access 170: Discovering XSS Vulnerabilities 9min
- log in to buy this course and get access 171: Exploiting XSS Vulnerabilities 5min
- log in to buy this course and get access 172: Implementing Code To Discover XSS in Forms 8min
- log in to buy this course and get access 173: Implementing Code To Discover XSS in Parameters 8min
- log in to buy this course and get access 174: Automatically Discovering Vulnerabilities Using the Vulnerability Scanner 9min



