Introduction and Setup
  • Welcome to Python for ethical hacking!
  • VirtualBox installation
  • Kali Linux installation
  • Adding Guest Additions
  • Python in Kali terminal
Port and Vulnerability Scanning
  • Coding a simple port scanner
  • Adding raw_input to our port scanner
  • Scanning the first 1,000 ports
  • Coding an advanced port scanner part 1
  • Coding an advanced port scanner part 2
  • Finishing and testing our scanner
  • Configuring IP address and installing Metasploitable
  • Returning banner from open port
  • Coding a vulnerability scanner part 1
  • Coding a vulnerability scanner part 2
SSH and FTP Attacks
  • Automating SSH login part 1
  • Automating SSH login part 2
  • Testing our SSH login program
  • Coding a SSH brute-forcer
  • Executing commands on target after brute-forcing SSH
  • Anonymous FTP login attack
  • Username & password list attack on FTP
Password Cracking
  • SHA256, SHA512, MD5
  • Cracking SHA1 hash with online dictionary
  • Getting password from MD5 hash
  • Cracking crypt passwords with salt
Sniffers, Flooders and Spoofers
  • Changing MAC address manually
  • Coding MAC address changer
  • Theory behind ARP spoofing
  • Crafting malicious ARP packet
  • Coding ARP spoofer
  • Forwarding packets and restoring ARP tables
  • Spoofing our IP address and sending message with TCP payload
  • Running SynFlooder with changed source IP address
  • Getting source and destination MAC address from received packets
  • Sniffing FTP username and password part 1
  • Sniffing FTP username and password part 2
  • Getting passwords from HTTP websites
Coding DNS Spoofer
  • Cloning any webpage
  • Printing DNS queries
  • Redirecting response to cloned page
  • Setting IP table rules and running DNS spoofer
Network Analysis
  • Analyzing Ethernet header
  • Analyzing IP header part 1
  • Analyzing IP header part 2
  • Analyzing TCP header
  • Analyzing UDP header
Multi-functioning Reverse Shell
  • Theory behind socket programming
  • Wine and Pyinstaller installation
  • Setting up listener
  • Establishing connection between target and server
  • Implementing send & receive functions
  • Executing commands on target system
  • Importing JSON library to parse data
  • Converting Python backdoor to .exe
  • Using OS library to change directory
  • Downloading & uploading files to target PC
  • Hiding our backdoor and creating persistence
  • Trying to connect to server every 20 seconds
  • Downloading files to target PC
  • Capturing screenshot on target PC
  • Administrator privilege check
  • Starting other programs with our shell
  • Running our shell as an image, audio, PDF
Coding a Keylogger
  • Installing Pynput
  • Printing space character
  • Calling timer on our keylogger
  • Adding keylogger to our backdoor
Command and Control Center
  • What is a threaded server?
  • Accepting connections with a thread
  • Managing multiple sessions
  • Testing threaded server with Windows 10 target
  • Fixing Q command
  • Coding exit function
  • Attacking multiple targets and gathering botnet
Website Penetration Testing
  • Stealing saved wireless passwords
  • Saving passwords to a file
  • Bruteforcing Gmail
  • Bruteforcing any login page part 1
  • Bruteforcing any login page part 2
  • Finding hidden directories part 1
  • Finding hidden directories part 2
  • Discovering subdomains
  • Changing HTTP headers
  • Starting basic and digest authentication bruteforcer
  • Controlling threads
  • Coding run function
  • Printing usage and testing our program
  • Taking a look at ransomware