Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,050 --> 00:00:02,430
Hello and welcome.
2
00:00:02,490 --> 00:00:03,560
My name is Zahed.
3
00:00:03,600 --> 00:00:07,970
I'm an ethical hacker a computer scientist and I'll be your instructor and this course
4
00:00:14,490 --> 00:00:17,040
this course is going to be highly practical.
5
00:00:17,130 --> 00:00:19,160
What it won't neglect the theory.
6
00:00:19,410 --> 00:00:25,380
So we'll start by covering some terminology then I'm going to show you how to install the needed software
7
00:00:25,560 --> 00:00:30,580
in order to write quite some programs and practice hotcake safely.
8
00:00:31,770 --> 00:00:37,770
Throughout the course we're going to learn by example so we'll never have any boring playing program
9
00:00:37,770 --> 00:00:38,700
in lectures.
10
00:00:38,700 --> 00:00:44,910
We will always be building something exciting and I'm going to teach you programming as we build these
11
00:00:44,910 --> 00:00:47,120
exciting programs.
12
00:00:47,220 --> 00:00:51,210
The first program we'll write is a mock changer.
13
00:00:51,210 --> 00:00:56,190
This is a very simple program that can be used to change the MAC address.
14
00:00:56,220 --> 00:01:00,580
Don't worry if you don't know what a MAC address is or why you'd want to change it.
15
00:01:00,630 --> 00:01:03,020
We will cover all of that later on.
16
00:01:03,090 --> 00:01:09,900
Basically the whole point of writing this program is to introduce you to Python basics such as writing
17
00:01:09,900 --> 00:01:16,190
functions variables handling user input projects and so on.
18
00:01:16,440 --> 00:01:23,130
And here you'll learn how to properly model a problem write an algorithm to solve this problem and then
19
00:01:23,130 --> 00:01:27,140
write Python code to implement this solution.
20
00:01:27,150 --> 00:01:32,880
Once we have the basics covered we're going to start writing a little bit more complex programs.
21
00:01:33,420 --> 00:01:39,630
So we'll start with a network scanner which is a program that can discover all clients connected to
22
00:01:39,630 --> 00:01:45,270
the same network and display their IP address and MAC address in here.
23
00:01:45,270 --> 00:01:47,230
I'm going to introduce you to skippy.
24
00:01:47,460 --> 00:01:53,460
And I'm going to teach you how to send and receive our responses and analyze them.
25
00:01:53,460 --> 00:01:59,970
I will also introduce you to dictionaries and lists and will see how to use them and all the operations
26
00:01:59,970 --> 00:02:02,020
that we can invoke on them.
27
00:02:02,810 --> 00:02:05,550
Next we'll dive deeper into networking.
28
00:02:05,690 --> 00:02:09,420
We're going to learn what AARP is what it's used for.
29
00:02:09,560 --> 00:02:17,880
What is AARP proofing and how to write a Python program to run an AARP spoofing attack as we do this.
30
00:02:17,900 --> 00:02:26,540
You'll learn more about K.P. analyzing network layers handling exceptions loops and more that were going
31
00:02:26,540 --> 00:02:29,710
to die even deeper and networking.
32
00:02:30,020 --> 00:02:36,470
So you're going to learn how to sniff data sent or received by any computer connected to the same network
33
00:02:36,500 --> 00:02:37,510
as us.
34
00:02:37,520 --> 00:02:45,560
This means we'll be able to see visited websites logon information passwords and pretty much everything
35
00:02:45,590 --> 00:02:47,590
they do on the internet.
36
00:02:48,740 --> 00:02:55,700
You'll also learn how to analyze data sent in the different layers in each packet and how to modify
37
00:02:55,700 --> 00:02:56,550
the data.
38
00:02:57,490 --> 00:03:04,950
So we will be able to inject code and hasty DML pages loaded by any computer on the same network we'll
39
00:03:04,960 --> 00:03:11,890
be able to replace downloads and even spoof DNS requests to any destination we want.
40
00:03:12,750 --> 00:03:21,690
We'll learn all of this by writing a sniffer a dn a spoof or a code injector on a file interceptor Once
41
00:03:21,690 --> 00:03:28,610
done with all of this will move to a really exciting section where you'll learn how to write malware.
42
00:03:28,650 --> 00:03:35,680
We'll start with writing simple evil programs so programs that can download a file execute code sent
43
00:03:35,730 --> 00:03:42,270
a report by e-mail and then I'm going to show you how to combine all of these programs to suit different
44
00:03:42,270 --> 00:03:49,770
scenarios and execute powerful attacks that we're going to advance into writing more complex malware
45
00:03:49,980 --> 00:03:57,000
and we'll start by writing a back door a back door is a program that gives you full control over the
46
00:03:57,000 --> 00:04:00,470
system that it gets executed on.
47
00:04:00,540 --> 00:04:05,520
We're going to implement this using sockets and you're going to learn how to establish a connection
48
00:04:05,730 --> 00:04:10,390
between two devices and transfer data between them.
49
00:04:10,920 --> 00:04:16,250
This is very useful because it can be used in so many other scenarios other than hacking.
50
00:04:16,380 --> 00:04:23,920
So you can use it to create a web server a chat program and so on then we're going to build more cool
51
00:04:23,920 --> 00:04:30,790
features in this backdoor so that we can use it to execute system commands remotely on the target computer
52
00:04:31,030 --> 00:04:39,340
download and upload files and maintain our access even if the system restarts then we will implement
53
00:04:39,340 --> 00:04:45,970
a key logger which is a program that registers every keystroke entered on the keyboard and send us a
54
00:04:45,970 --> 00:04:49,410
report by e-mail as we do this.
55
00:04:49,420 --> 00:04:55,440
I'm going to teach you about recursive functions threading and object oriented programming.
56
00:04:55,690 --> 00:05:00,850
And the last part of the section I'm going to show you how to package all of the programs that we've
57
00:05:00,850 --> 00:05:08,270
built so far so that they can run on any operating system on Windows OS X and Linux.
58
00:05:08,320 --> 00:05:13,810
Not only that but I'm also going to show you how to convert these programs into Trojans.
59
00:05:13,810 --> 00:05:21,760
So they look and function just like any other file type like an image or a PTF finally will move to
60
00:05:21,760 --> 00:05:27,250
the Web site hacking section where you learn how websites work and how to communicate with Web sites
61
00:05:27,250 --> 00:05:28,480
using Python.
62
00:05:28,720 --> 00:05:35,980
And then we'll build a number of information gathering programs that can be used to discover files directories
63
00:05:36,130 --> 00:05:43,470
and subdomains that were going to write a program that can be used to get the logging information of
64
00:05:43,560 --> 00:05:47,270
any log in page as we do this.
65
00:05:47,330 --> 00:05:54,430
You're going to learn how to read the Hastey code of any web page analyze it and extract the useful
66
00:05:54,430 --> 00:05:55,580
parts from it.
67
00:05:57,720 --> 00:06:02,070
Finally we're going to build a generic vulnerability scanner.
68
00:06:02,370 --> 00:06:09,980
This is a program that takes a website as an input and scans the whole website for weaknesses and vulnerabilities.
69
00:06:10,020 --> 00:06:15,960
Once done it's going to show us a report of all the discoveries and we're going to write this program
70
00:06:16,020 --> 00:06:22,050
in a way so that it can discover any type of vulnerability as we write this.
71
00:06:22,080 --> 00:06:28,050
We're going to learn more about object oriented programming on how to structure your program in a way
72
00:06:28,230 --> 00:06:30,770
so that it can be easily extended.
8055
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.