All language subtitles for 2. Course Introduction

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French Download
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,050 --> 00:00:02,430 Hello and welcome. 2 00:00:02,490 --> 00:00:03,560 My name is Zahed. 3 00:00:03,600 --> 00:00:07,970 I'm an ethical hacker a computer scientist and I'll be your instructor and this course 4 00:00:14,490 --> 00:00:17,040 this course is going to be highly practical. 5 00:00:17,130 --> 00:00:19,160 What it won't neglect the theory. 6 00:00:19,410 --> 00:00:25,380 So we'll start by covering some terminology then I'm going to show you how to install the needed software 7 00:00:25,560 --> 00:00:30,580 in order to write quite some programs and practice hotcake safely. 8 00:00:31,770 --> 00:00:37,770 Throughout the course we're going to learn by example so we'll never have any boring playing program 9 00:00:37,770 --> 00:00:38,700 in lectures. 10 00:00:38,700 --> 00:00:44,910 We will always be building something exciting and I'm going to teach you programming as we build these 11 00:00:44,910 --> 00:00:47,120 exciting programs. 12 00:00:47,220 --> 00:00:51,210 The first program we'll write is a mock changer. 13 00:00:51,210 --> 00:00:56,190 This is a very simple program that can be used to change the MAC address. 14 00:00:56,220 --> 00:01:00,580 Don't worry if you don't know what a MAC address is or why you'd want to change it. 15 00:01:00,630 --> 00:01:03,020 We will cover all of that later on. 16 00:01:03,090 --> 00:01:09,900 Basically the whole point of writing this program is to introduce you to Python basics such as writing 17 00:01:09,900 --> 00:01:16,190 functions variables handling user input projects and so on. 18 00:01:16,440 --> 00:01:23,130 And here you'll learn how to properly model a problem write an algorithm to solve this problem and then 19 00:01:23,130 --> 00:01:27,140 write Python code to implement this solution. 20 00:01:27,150 --> 00:01:32,880 Once we have the basics covered we're going to start writing a little bit more complex programs. 21 00:01:33,420 --> 00:01:39,630 So we'll start with a network scanner which is a program that can discover all clients connected to 22 00:01:39,630 --> 00:01:45,270 the same network and display their IP address and MAC address in here. 23 00:01:45,270 --> 00:01:47,230 I'm going to introduce you to skippy. 24 00:01:47,460 --> 00:01:53,460 And I'm going to teach you how to send and receive our responses and analyze them. 25 00:01:53,460 --> 00:01:59,970 I will also introduce you to dictionaries and lists and will see how to use them and all the operations 26 00:01:59,970 --> 00:02:02,020 that we can invoke on them. 27 00:02:02,810 --> 00:02:05,550 Next we'll dive deeper into networking. 28 00:02:05,690 --> 00:02:09,420 We're going to learn what AARP is what it's used for. 29 00:02:09,560 --> 00:02:17,880 What is AARP proofing and how to write a Python program to run an AARP spoofing attack as we do this. 30 00:02:17,900 --> 00:02:26,540 You'll learn more about K.P. analyzing network layers handling exceptions loops and more that were going 31 00:02:26,540 --> 00:02:29,710 to die even deeper and networking. 32 00:02:30,020 --> 00:02:36,470 So you're going to learn how to sniff data sent or received by any computer connected to the same network 33 00:02:36,500 --> 00:02:37,510 as us. 34 00:02:37,520 --> 00:02:45,560 This means we'll be able to see visited websites logon information passwords and pretty much everything 35 00:02:45,590 --> 00:02:47,590 they do on the internet. 36 00:02:48,740 --> 00:02:55,700 You'll also learn how to analyze data sent in the different layers in each packet and how to modify 37 00:02:55,700 --> 00:02:56,550 the data. 38 00:02:57,490 --> 00:03:04,950 So we will be able to inject code and hasty DML pages loaded by any computer on the same network we'll 39 00:03:04,960 --> 00:03:11,890 be able to replace downloads and even spoof DNS requests to any destination we want. 40 00:03:12,750 --> 00:03:21,690 We'll learn all of this by writing a sniffer a dn a spoof or a code injector on a file interceptor Once 41 00:03:21,690 --> 00:03:28,610 done with all of this will move to a really exciting section where you'll learn how to write malware. 42 00:03:28,650 --> 00:03:35,680 We'll start with writing simple evil programs so programs that can download a file execute code sent 43 00:03:35,730 --> 00:03:42,270 a report by e-mail and then I'm going to show you how to combine all of these programs to suit different 44 00:03:42,270 --> 00:03:49,770 scenarios and execute powerful attacks that we're going to advance into writing more complex malware 45 00:03:49,980 --> 00:03:57,000 and we'll start by writing a back door a back door is a program that gives you full control over the 46 00:03:57,000 --> 00:04:00,470 system that it gets executed on. 47 00:04:00,540 --> 00:04:05,520 We're going to implement this using sockets and you're going to learn how to establish a connection 48 00:04:05,730 --> 00:04:10,390 between two devices and transfer data between them. 49 00:04:10,920 --> 00:04:16,250 This is very useful because it can be used in so many other scenarios other than hacking. 50 00:04:16,380 --> 00:04:23,920 So you can use it to create a web server a chat program and so on then we're going to build more cool 51 00:04:23,920 --> 00:04:30,790 features in this backdoor so that we can use it to execute system commands remotely on the target computer 52 00:04:31,030 --> 00:04:39,340 download and upload files and maintain our access even if the system restarts then we will implement 53 00:04:39,340 --> 00:04:45,970 a key logger which is a program that registers every keystroke entered on the keyboard and send us a 54 00:04:45,970 --> 00:04:49,410 report by e-mail as we do this. 55 00:04:49,420 --> 00:04:55,440 I'm going to teach you about recursive functions threading and object oriented programming. 56 00:04:55,690 --> 00:05:00,850 And the last part of the section I'm going to show you how to package all of the programs that we've 57 00:05:00,850 --> 00:05:08,270 built so far so that they can run on any operating system on Windows OS X and Linux. 58 00:05:08,320 --> 00:05:13,810 Not only that but I'm also going to show you how to convert these programs into Trojans. 59 00:05:13,810 --> 00:05:21,760 So they look and function just like any other file type like an image or a PTF finally will move to 60 00:05:21,760 --> 00:05:27,250 the Web site hacking section where you learn how websites work and how to communicate with Web sites 61 00:05:27,250 --> 00:05:28,480 using Python. 62 00:05:28,720 --> 00:05:35,980 And then we'll build a number of information gathering programs that can be used to discover files directories 63 00:05:36,130 --> 00:05:43,470 and subdomains that were going to write a program that can be used to get the logging information of 64 00:05:43,560 --> 00:05:47,270 any log in page as we do this. 65 00:05:47,330 --> 00:05:54,430 You're going to learn how to read the Hastey code of any web page analyze it and extract the useful 66 00:05:54,430 --> 00:05:55,580 parts from it. 67 00:05:57,720 --> 00:06:02,070 Finally we're going to build a generic vulnerability scanner. 68 00:06:02,370 --> 00:06:09,980 This is a program that takes a website as an input and scans the whole website for weaknesses and vulnerabilities. 69 00:06:10,020 --> 00:06:15,960 Once done it's going to show us a report of all the discoveries and we're going to write this program 70 00:06:16,020 --> 00:06:22,050 in a way so that it can discover any type of vulnerability as we write this. 71 00:06:22,080 --> 00:06:28,050 We're going to learn more about object oriented programming on how to structure your program in a way 72 00:06:28,230 --> 00:06:30,770 so that it can be easily extended. 8055

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.