2: What is Programming, What is Hacking & Why Learn Them (Preview)
6minThis transcript is also available as a PDF download within the files tab.
What is Programming, What is Hacking & Why Learn Them (Preview)
Now, as I promised you, this course is going to be highly practical, but I also promised that I will not neglect the theory. So I want to cover some terminology before we jump into hacking on programming. Now what we mean by hacking is being able to gain access to a system that you’re not supposed to have access to. So for example, logging into an email account that you’re not supposed to have access to is considered hacking that account. Getting it access to a remote computer that you’re not supposed to have access to is how can that computer, reading information that you’re not supposed to be able to read again is considered hacking. So you can see that there is a large number of ways to hack into a system and the word hacking can refer to a number of things, but the main concept is the same.
Gaining access or being able to do things that you’re not supposed to be able to do is considered hacking. Now there are three main types of hackers. We have the black hat hackers. These are the bad people that hack systems illegally in order to steal money or to achieve their own illegal goals. The second part of hackers are the white hat hackers. So this is us. These people use the same techniques used by the black hat hackers and they also hack into systems, but they are only hacking to systems that they have permission to hack in order to test the security of the systems. And finally we have the grey hat hackers. These are a mixture of the two. So they’ll hack into any system even if they don’t have permission to test the security of the system. But they will never steal money or damage that system.
And in most cases they’ll go ahead and tell the administrator of that system. But what they do is still in legal because they test the security of systems that they do not own or do not have permission to test. Now, one big question that people always ask is why hacking? Why teach or learn hacking? Well, hacking is an existing industry. There are lots of job opportunities for ethical hackers. For people like us who would go ahead and test the security of systems to make sure that these systems are secure and not vulnerable to black hat hackers. There is actually a huge demand for ethical hackers these days because of the increased amount of hacking attacks. So we hear on the daily big systems and big companies are getting hacked. Not so long ago, Uber got hacked and information of more than 56 million users were exposed. So companies like Uber, Facebook, and Google, they hire hackers in order to try and hack into their systems and tell them where the weaknesses are so that they can fix it.
They also have bug bounty programs where they literally ask all the hackers around the world to go ahead and try to hack into their websites and with their web applications. And if they could, they will pay them a bounty for the bugs that they find now, thus the hacking part covered. But this course is not only a hacking course, we will also cover programming. So what do we mean by programming? Well, programming is the process of writing a program. And this vague definition lead us to the next question. What is a program? Well, our program is a set of instructions that will allow us to solve a problem. For example, we have the Facebook APP or the Facebook website and the problem that it solves is social networking. So it allows us to stay connected with our friends and family. And other example is your media player such as iTunes.
It’s solves the problem of playing music for you. So if you think of it, any program that you use solves a certain problem. So programming is the process of writing a program to solve a problem. Now since this is a hacking and programming course, our problem is always going to be trying to hack into a certain system. So basically we will be writing programs that will allow us to hack into networks, computers, websites, and so on. Now the solution for the problem cannot be written in plain English. You’re going to have to write it in a language that the computer can understand. So you’re going to have to use a programming language to do that. Now you can use any programming language to write programs for hacking, but in this course we’re only going to be using python. The reason why I picked python, because it’s a very simple language, yet powerful.
It’s open source and object oriented and it has great libraries that can be used for both for hacking and for writing. Very useful normal programs other than hacking programs. Now the last question that you might think we covered, why you’d want to learn hacking, but why would you want to learn programming? Well, programming is a very, very important skill these days. Everything around us is controlled by computers and the only way to communicate with computers is to write programs. Some countries are even starting to teach programming to their school children because they think it is just as important as learning in maths and other subjects. Now, since you want to be a hacker or you’re interested in hacking, then programming is very, very important for you, especially because it’ll allow you to start implementing your own attacks. So instead of using other tools made by other people, you’re going to be able to write your own tools to exploit weaknesses that you discover or to carry out attacks that nobody has ever implemented. Not only that, what you’re going to have the ability to read programs written by other people and extend them, fix them if they have bogs or extend them to make them fit your situation or your scenario.
You must Login to access notes.
All videos in this course
Lessons
- log in to buy this course and get access 1: Introduction 7min
- log in to buy this course and get access 2: What is Programming, What is Hacking & Why Learn Them (Preview) 6min
- log in to buy this course and get access 3: Lab Overview & Needed Software 8min
- log in to buy this course and get access 4: Installing Kali 2019 as a virtual Machine 10min
- log in to buy this course and get access 5: Basic Overview of Kali Linux 5min
- log in to buy this course and get access 6: The Terminal & Linux Commands 11min
- log in to buy this course and get access 7: Python 2 VS Python 3 & Writing Our First Program 9min
- log in to buy this course and get access 8: Installing & Using a Python IDE 9min
- log in to buy this course and get access 9: What is MAC Address & How To Change it 8min
- log in to buy this course and get access 10: Using Python Modules & Executing System Commands (Preview) 9min
- log in to buy this course and get access 11: Implementing a Very Basic MAC Changer (Preview) 5min
- log in to buy this course and get access 12: Variables & Strings 10min
- log in to buy this course and get access 13: Using Variables in MAC Changer 4min
- log in to buy this course and get access 14: Getting Input From The User 10min
- log in to buy this course and get access 15: Handling User Input (Preview) 10min
- log in to buy this course and get access 16: Handling Command-line Arguments 10min
- log in to buy this course and get access 17: Initialising Variables Based on Command-line Arguments 8min
- log in to buy this course and get access 18: Functions 10min
- log in to buy this course and get access 19: Returning Values From Functions 7min
- log in to buy this course and get access 20: Decision Making - Theory 7min
- log in to buy this course and get access 21: Using Conditional Statements in MAC Changer 9min
- log in to buy this course and get access 22: What is an Algorithm 3min
- log in to buy this course and get access 23: Reading Output Returned By System Commands 6min
- log in to buy this course and get access 24: Regular Expressions (Regex) 8min
- log in to buy this course and get access 25: Extracting a Substring Using Regex 6min
- log in to buy this course and get access 26: Refactoring & Housekeeping 11min
- log in to buy this course and get access 27: Implementing The Algorithm to Check The Mac Did Change (Preview) 6min
- log in to buy this course and get access 28: Programming a Network Scanner - Introduction & Teaser 10min
- log in to buy this course and get access 29: Installing Windows as a Virtual Machine 4min
- log in to buy this course and get access 30: What is ARP & What its Used For? 10min
- log in to buy this course and get access 31: Designing an Algorithm To Discover Clients Connected To The Same Network 4min
- log in to buy this course and get access 32: Using Scapy To Create an ARP Request 7min
- log in to buy this course and get access 33: Combining Frames To Broadcast Packets 9min
- log in to buy this course and get access 34: Sending & Receiving Packets 7min
- log in to buy this course and get access 35: Lists 8min
- log in to buy this course and get access 36: Iterating Over Lists & Analysing Packet 10min
- log in to buy this course and get access 37: Using Escape Characters To Enhance Program Output 6min
- log in to buy this course and get access 38: Dictionaries 9min
- log in to buy this course and get access 39: Improving the Program Using a List of Dictionaries 9min
- log in to buy this course and get access 40: Iterating Over Nested Data Structures 7min
- log in to buy this course and get access 41: Python 3 Compatibility 7min
- log in to buy this course and get access 42: What is ARP Spoofing? 6min
- log in to buy this course and get access 43: Redirecting the Flow of Packets in a Network Using arpspoof 5min
- log in to buy this course and get access 44: Creating an ARP Response 7min
- log in to buy this course and get access 45: Sending ARP Responses 5min
- log in to buy this course and get access 46: Extracting MAC Address From Responses 7min
- log in to buy this course and get access 47: Loops 9min
- log in to buy this course and get access 48: More on Loops & Counters 8min
- log in to buy this course and get access 49: Dynamic Printing 7min
- log in to buy this course and get access 50: Handling Exceptions 5min
- log in to buy this course and get access 51: Implementing a Restore Function 12min
- log in to buy this course and get access 52: Restoring ARP Tables When an Exception Occures 6min
- log in to buy this course and get access 53: Writing a Packet Sniffer - Introduction & Teaser 5min
- log in to buy this course and get access 54: Sniffing Packets Using Scapy 7min
- log in to buy this course and get access 55: Extracting data From a Specific Layer 7min
- log in to buy this course and get access 56: Analysing Sniffed Packets & Extracting Fields From Layers 12min
- log in to buy this course and get access 57: Analysing Fields & Extracting Passwords 11min
- log in to buy this course and get access 58: Extracting URLs 8min
- log in to buy this course and get access 59: Capturing Passwords From Any Computer Connected to the Same Network 8min
- log in to buy this course and get access 60: Intercepting Packets - Creating a Proxy 13min
- log in to buy this course and get access 61: Converting Packets to Scapy Packets 9min
- log in to buy this course and get access 62: What is DNS Spoofing 7min
- log in to buy this course and get access 63: Filtering DNS Responses 6min
- log in to buy this course and get access 64: Analysing & Creating a Custom DNS Response 8min
- log in to buy this course and get access 65: Modifying Packets On The Fly 8min
- log in to buy this course and get access 66: Redirecting DNS Responses (Preview) 6min
- log in to buy this course and get access 67: Writing a File Interceptor - Introduction & Teaser (Preview) 4min
- log in to buy this course and get access 68: Filtering Traffic Based on the Port Used 9min
- log in to buy this course and get access 69: Analysing HTTP Requests 5min
- log in to buy this course and get access 70: Intercepting HTTP Requests 10min
- log in to buy this course and get access 71: Modifying HTTP Responses on The Fly 11min
- log in to buy this course and get access 72: Intercepting & Replacing Downloads on The Network (Preview) 9min
- log in to buy this course and get access 73: Writing a Code Injector - Introduction & Teaser (Preview) 1min
- log in to buy this course and get access 74: Analysing HTTP Responses 7min
- log in to buy this course and get access 75: Replacing a Substring Using Regex 7min
- log in to buy this course and get access 76: Decoding HTTP Responses 10min
- log in to buy this course and get access 77: Modifying HTTP Responses & Injecting Javascript Code in HTML Pages 9min
- log in to buy this course and get access 78: Refactoring & Housekeeping 8min
- log in to buy this course and get access 79: Debugging Issues 6min
- log in to buy this course and get access 80: Using Groups & None-capturing Regex 6min
- log in to buy this course and get access 81: Recalculating Content Length 11min
- log in to buy this course and get access 82: BeEF Overview & Basic Hook Method 7min
- log in to buy this course and get access 83: Hooking Computers Using code_injector 5min
- log in to buy this course and get access 84: Basic BeEF Commands 4min
- log in to buy this course and get access 85: Delivering Malware Using BeEF 6min
- log in to buy this course and get access 86: How to Bypass HTTPS (Preview) 10min
- log in to buy this course and get access 87: Bypassing HTTPS & Sniffing Login Credentials 8min
- log in to buy this course and get access 88: Replacing Downloads on HTTPS Pages 11min
- log in to buy this course and get access 89: Injecting Code in HTTPS Pages 8min
- log in to buy this course and get access 90: Running Python Programs on Windows 10min
- log in to buy this course and get access 91: Capturing & Analysing ARP Responses 7min
- log in to buy this course and get access 92: Detecting ARP Spoofing Attacks 8min
- log in to buy this course and get access 93: Writing Malware - Introduction & Teaser 2min
- log in to buy this course and get access 94: Execute System Command Payload 10min
- log in to buy this course and get access 95: Sending Reports By Email 11min
- log in to buy this course and get access 96: Filtering Command Output Using Regex 10min
- log in to buy this course and get access 97: Stealing WiFi Passwords Saved on a Computer 9min
- log in to buy this course and get access 98: Downloading Files From Program 8min
- log in to buy this course and get access 99: Writing Files on Disk 11min
- log in to buy this course and get access 100: Password Recovery Basics 8min
- log in to buy this course and get access 101: Using all the Above to Steal Saved Passwords Remotely 8min
- log in to buy this course and get access 102: Interacting With The File System 11min
- log in to buy this course and get access 103: Writing Malware: Keylogger -Introduction & Teaser (Preview) 4min
- log in to buy this course and get access 104: Writing a Basic Local Keylogger 10min
- log in to buy this course and get access 105: Global Variables 8min
- log in to buy this course and get access 106: Logging Special Keys 7min
- log in to buy this course and get access 107: Threading & Recursion 11min
- log in to buy this course and get access 108: OOP - Object Oriented Programming Basics 15min
- log in to buy this course and get access 109: Constructor Methods & Instance Variables 8min
- log in to buy this course and get access 110: Logging Key-strikes and Reporting Them By Email 12min
- log in to buy this course and get access 111: Writing Malware: Backdoors - Introduction & Teaser 6min
- log in to buy this course and get access 112: Client - Server Communication & Connection Types 8min
- log in to buy this course and get access 113: Connecting Two Remote Computers Using Sockets 10min
- log in to buy this course and get access 114: Sending & Receiving Data Over TCP 5min
- log in to buy this course and get access 115: Executing System Commands Remotely 10min
- log in to buy this course and get access 116: Implementing a Server 9min
- log in to buy this course and get access 117: Implementing Skeleton For Server - Client Communication 7min
- log in to buy this course and get access 118: Refactoring - Creating a Listener Class 8min
- log in to buy this course and get access 119: Refactoring - Creating a Backdoor Class 6min
- log in to buy this course and get access 120: Serialisation - Theory 11min
- log in to buy this course and get access 121: Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP 8min
- log in to buy this course and get access 122: Serialisation - Reliably Sending & Receiving Data 6min
- log in to buy this course and get access 123: Sending Commands as List & Implementing Exit Command 8min
- log in to buy this course and get access 124: Interacting With the File System - Implementing "cd" Command 9min
- log in to buy this course and get access 125: Reading Files 7min
- log in to buy this course and get access 126: Writing Files 7min
- log in to buy this course and get access 127: Downloading Files From Hacked Computer 8min
- log in to buy this course and get access 128: Implementing Upload Functionality in Listener 8min
- log in to buy this course and get access 129: Implementing Upload Functionality in Backdoor 6min
- log in to buy this course and get access 130: Handling Unknown Exceptions 9min
- log in to buy this course and get access 131: Using the Backdoor to Hack Windows, Linux & OS X 12min
- log in to buy this course and get access 132: Writing Malware: Packaging - Introduction & Teaser (Preview) 3min
- log in to buy this course and get access 133: Converting Python Programs To Windows Binary Executables 7min
- log in to buy this course and get access 134: Running Executables Silentely 7min
- log in to buy this course and get access 135: Installing Windows Pyinstaller on Linux 8min
- log in to buy this course and get access 136: Packaging Programs For Windows From Linux 8min
- log in to buy this course and get access 137: Persistence Idea 8min
- log in to buy this course and get access 138: Running Programs on Startupesson 15min
- log in to buy this course and get access 139: Creating a Basic Trojan Using Download & Execute Payload 10min
- log in to buy this course and get access 140: Creating a Trojan By Embedding Files In Program Code 8min
- log in to buy this course and get access 141: Bypassing Anti-Virus Programs - Theory 5min
- log in to buy this course and get access 142: Bypassing Anti-Virus Programs - Practical 9min
- log in to buy this course and get access 143: Adding an Icon to Generated Executables 5min
- log in to buy this course and get access 144: Spoofing File Extension 9min
- log in to buy this course and get access 145: Converting Python Programs To OS X Executables 9min
- log in to buy this course and get access 146: Converting Python Programs to Linux Executables 7min
- log in to buy this course and get access 147: Website / Web Application Hacking - Introduction & Teaser 7min
- log in to buy this course and get access 148: What is a Website 4min
- log in to buy this course and get access 149: How to Hack a Website 5min
- log in to buy this course and get access 150: Sending GET Requests To Web Servers 10min
- log in to buy this course and get access 151: Discovering Subdomains 11min
- log in to buy this course and get access 152: Discovering Hidden Paths in Websites 11min
- log in to buy this course and get access 153: Reading Response Content 6min
- log in to buy this course and get access 154: Extracting Useful Data From Response 7min
- log in to buy this course and get access 155: Filtering Results 7min
- log in to buy this course and get access 156: Extracting Unique Links & Storing Them In a List 7min
- log in to buy this course and get access 157: Recursively Discovering All Paths On a Target Website 10min
- log in to buy this course and get access 158: Sending Post Requests to Websites 12min
- log in to buy this course and get access 159: Guessing Login Information on Login Pages 9min
- log in to buy this course and get access 160: Writing a Vulnerability Scanner - Introduction & Teaser 3min
- log in to buy this course and get access 161: HTTP Requests - POST VS GET 7min
- log in to buy this course and get access 162: Parsing HTML Code 8min
- log in to buy this course and get access 163: Extracting HTML Attributes 10min
- log in to buy this course and get access 164: Posting Forms 10min
- log in to buy this course and get access 165: Building Basic Structure For Vulnerability Scanner 11min
- log in to buy this course and get access 166: Using Default Parameters 5min
- log in to buy this course and get access 167: Sending Requests in a Session 9min
- log in to buy this course and get access 168: Extracting & Submitting Forms Automatically 10min
- log in to buy this course and get access 169: Implementing a Method To Run The Scanner 6min
- log in to buy this course and get access 170: Discovering XSS Vulnerabilities 9min
- log in to buy this course and get access 171: Exploiting XSS Vulnerabilities 5min
- log in to buy this course and get access 172: Implementing Code To Discover XSS in Forms 8min
- log in to buy this course and get access 173: Implementing Code To Discover XSS in Parameters 8min
- log in to buy this course and get access 174: Automatically Discovering Vulnerabilities Using the Vulnerability Scanner 9min



