- Welcome to Python for ethical hacking!
- VirtualBox installation
- Kali Linux installation
- Adding Guest Additions
- Python in Kali terminal
- Coding a simple port scanner
- Adding raw_input to our port scanner
- Scanning the first 1,000 ports
- Coding an advanced port scanner part 1
- Coding an advanced port scanner part 2
- Finishing and testing our scanner
- Configuring IP address and installing Metasploitable
- Returning banner from open port
- Coding a vulnerability scanner part 1
- Coding a vulnerability scanner part 2
- Automating SSH login part 1
- Automating SSH login part 2
- Testing our SSH login program
- Coding a SSH brute-forcer
- Executing commands on target after brute-forcing SSH
- Anonymous FTP login attack
- Username & password list attack on FTP
- SHA256, SHA512, MD5
- Cracking SHA1 hash with online dictionary
- Getting password from MD5 hash
- Cracking crypt passwords with salt
- Changing MAC address manually
- Coding MAC address changer
- Theory behind ARP spoofing
- Crafting malicious ARP packet
- Coding ARP spoofer
- Forwarding packets and restoring ARP tables
- Spoofing our IP address and sending message with TCP payload
- Running SynFlooder with changed source IP address
- Getting source and destination MAC address from received packets
- Sniffing FTP username and password part 1
- Sniffing FTP username and password part 2
- Getting passwords from HTTP websites
- Cloning any webpage
- Printing DNS queries
- Redirecting response to cloned page
- Setting IP table rules and running DNS spoofer
- Analyzing Ethernet header
- Analyzing IP header part 1
- Analyzing IP header part 2
- Analyzing TCP header
- Analyzing UDP header
- Theory behind socket programming
- Wine and Pyinstaller installation
- Setting up listener
- Establishing connection between target and server
- Implementing send & receive functions
- Executing commands on target system
- Importing JSON library to parse data
- Converting Python backdoor to .exe
- Using OS library to change directory
- Downloading & uploading files to target PC
- Hiding our backdoor and creating persistence
- Trying to connect to server every 20 seconds
- Downloading files to target PC
- Capturing screenshot on target PC
- Administrator privilege check
- Starting other programs with our shell
- Running our shell as an image, audio, PDF
- Installing Pynput
- Printing space character
- Calling timer on our keylogger
- Adding keylogger to our backdoor
- What is a threaded server?
- Accepting connections with a thread
- Managing multiple sessions
- Testing threaded server with Windows 10 target
- Fixing Q command
- Coding exit function
- Attacking multiple targets and gathering botnet
- Stealing saved wireless passwords
- Saving passwords to a file
- Bruteforcing Gmail
- Bruteforcing any login page part 1
- Bruteforcing any login page part 2
- Finding hidden directories part 1
- Finding hidden directories part 2
- Discovering subdomains
- Changing HTTP headers
- Starting basic and digest authentication bruteforcer
- Controlling threads
- Coding run function
- Printing usage and testing our program
- Taking a look at ransomware