All language subtitles for 1. Introductionqqweeeaa daq
Afrikaans
Akan
Albanian
Amharic
Arabic
Armenian
Azerbaijani
Basque
Belarusian
Bemba
Bengali
Bihari
Bosnian
Breton
Bulgarian
Cambodian
Catalan
Cebuano
Cherokee
Chichewa
Chinese (Simplified)
Chinese (Traditional)
Corsican
Croatian
Czech
Danish
Dutch
English
Esperanto
Estonian
Ewe
Faroese
Filipino
Finnish
French
Frisian
Ga
Galician
Georgian
German
Greek
Guarani
Gujarati
Haitian Creole
Hausa
Hawaiian
Hebrew
Hindi
Hmong
Hungarian
Icelandic
Igbo
Indonesian
Interlingua
Irish
Italian
Japanese
Javanese
Kannada
Kazakh
Kinyarwanda
Kirundi
Kongo
Korean
Krio (Sierra Leone)
Kurdish
Kurdish (SoranĂ®)
Kyrgyz
Laothian
Latin
Latvian
Lingala
Lithuanian
Lozi
Luganda
Luo
Luxembourgish
Macedonian
Malagasy
Malay
Malayalam
Maltese
Maori
Marathi
Mauritian Creole
Moldavian
Mongolian
Myanmar (Burmese)
Montenegrin
Nepali
Nigerian Pidgin
Northern Sotho
Norwegian
Norwegian (Nynorsk)
Occitan
Oriya
Oromo
Pashto
Persian
Polish
Portuguese (Brazil)
Portuguese (Portugal)
Punjabi
Quechua
Romanian
Romansh
Runyakitara
Russian
Samoan
Scots Gaelic
Serbian
Serbo-Croatian
Sesotho
Setswana
Seychellois Creole
Shona
Sindhi
Sinhalese
Slovak
Slovenian
Somali
Spanish
Spanish (Latin American)
Sundanese
Swahili
Swedish
Tajik
Tamil
Tatar
Telugu
Thai
Tigrinya
Tonga
Tshiluba
Tumbuka
Turkish
Turkmen
Twi
Uighur
Ukrainian
Urdu
Uzbek
Vietnamese
Welsh
Wolof
Xhosa
Yiddish
Yoruba
Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,050 --> 00:00:02,430
Hello and welcome.
2
00:00:02,490 --> 00:00:03,560
My name is Zahed.
3
00:00:03,600 --> 00:00:07,970
I'm an ethical hacker a computer scientist and I'll be your instructor and this course
4
00:00:14,490 --> 00:00:17,040
this course is going to be highly practical.
5
00:00:17,130 --> 00:00:19,160
What it won't neglect the theory.
6
00:00:19,410 --> 00:00:25,380
So we'll start by covering some terminology then I'm going to show you how to install the needed software
7
00:00:25,560 --> 00:00:30,580
in order to write quite some programs and practice hotcake safely.
8
00:00:31,770 --> 00:00:37,770
Throughout the course we're going to learn by example so we'll never have any boring playing program
9
00:00:37,770 --> 00:00:38,700
in lectures.
10
00:00:38,700 --> 00:00:44,910
We will always be building something exciting and I'm going to teach you programming as we build these
11
00:00:44,910 --> 00:00:47,120
exciting programs.
12
00:00:47,220 --> 00:00:51,210
The first program we'll write is a mock changer.
13
00:00:51,210 --> 00:00:56,190
This is a very simple program that can be used to change the MAC address.
14
00:00:56,220 --> 00:01:00,580
Don't worry if you don't know what a MAC address is or why you'd want to change it.
15
00:01:00,630 --> 00:01:03,020
We will cover all of that later on.
16
00:01:03,090 --> 00:01:09,900
Basically the whole point of writing this program is to introduce you to Python basics such as writing
17
00:01:09,900 --> 00:01:16,190
functions variables handling user input projects and so on.
18
00:01:16,440 --> 00:01:23,130
And here you'll learn how to properly model a problem write an algorithm to solve this problem and then
19
00:01:23,130 --> 00:01:27,140
write Python code to implement this solution.
20
00:01:27,150 --> 00:01:32,880
Once we have the basics covered we're going to start writing a little bit more complex programs.
21
00:01:33,420 --> 00:01:39,630
So we'll start with a network scanner which is a program that can discover all clients connected to
22
00:01:39,630 --> 00:01:45,270
the same network and display their IP address and MAC address in here.
23
00:01:45,270 --> 00:01:47,230
I'm going to introduce you to skippy.
24
00:01:47,460 --> 00:01:53,460
And I'm going to teach you how to send and receive our responses and analyze them.
25
00:01:53,460 --> 00:01:59,970
I will also introduce you to dictionaries and lists and will see how to use them and all the operations
26
00:01:59,970 --> 00:02:02,020
that we can invoke on them.
27
00:02:02,810 --> 00:02:05,550
Next we'll dive deeper into networking.
28
00:02:05,690 --> 00:02:09,420
We're going to learn what AARP is what it's used for.
29
00:02:09,560 --> 00:02:17,880
What is AARP proofing and how to write a Python program to run an AARP spoofing attack as we do this.
30
00:02:17,900 --> 00:02:26,540
You'll learn more about K.P. analyzing network layers handling exceptions loops and more that were going
31
00:02:26,540 --> 00:02:29,710
to die even deeper and networking.
32
00:02:30,020 --> 00:02:36,470
So you're going to learn how to sniff data sent or received by any computer connected to the same network
33
00:02:36,500 --> 00:02:37,510
as us.
34
00:02:37,520 --> 00:02:45,560
This means we'll be able to see visited websites logon information passwords and pretty much everything
35
00:02:45,590 --> 00:02:47,590
they do on the internet.
36
00:02:48,740 --> 00:02:55,700
You'll also learn how to analyze data sent in the different layers in each packet and how to modify
37
00:02:55,700 --> 00:02:56,550
the data.
38
00:02:57,490 --> 00:03:04,950
So we will be able to inject code and hasty DML pages loaded by any computer on the same network we'll
39
00:03:04,960 --> 00:03:11,890
be able to replace downloads and even spoof DNS requests to any destination we want.
40
00:03:12,750 --> 00:03:21,690
We'll learn all of this by writing a sniffer a dn a spoof or a code injector on a file interceptor Once
41
00:03:21,690 --> 00:03:28,610
done with all of this will move to a really exciting section where you'll learn how to write malware.
42
00:03:28,650 --> 00:03:35,680
We'll start with writing simple evil programs so programs that can download a file execute code sent
43
00:03:35,730 --> 00:03:42,270
a report by e-mail and then I'm going to show you how to combine all of these programs to suit different
44
00:03:42,270 --> 00:03:49,770
scenarios and execute powerful attacks that we're going to advance into writing more complex malware
45
00:03:49,980 --> 00:03:57,000
and we'll start by writing a back door a back door is a program that gives you full control over the
46
00:03:57,000 --> 00:04:00,470
system that it gets executed on.
47
00:04:00,540 --> 00:04:05,520
We're going to implement this using sockets and you're going to learn how to establish a connection
48
00:04:05,730 --> 00:04:10,390
between two devices and transfer data between them.
49
00:04:10,920 --> 00:04:16,250
This is very useful because it can be used in so many other scenarios other than hacking.
50
00:04:16,380 --> 00:04:23,920
So you can use it to create a web server a chat program and so on then we're going to build more cool
51
00:04:23,920 --> 00:04:30,790
features in this backdoor so that we can use it to execute system commands remotely on the target computer
52
00:04:31,030 --> 00:04:39,340
download and upload files and maintain our access even if the system restarts then we will implement
53
00:04:39,340 --> 00:04:45,970
a key logger which is a program that registers every keystroke entered on the keyboard and send us a
54
00:04:45,970 --> 00:04:49,410
report by e-mail as we do this.
55
00:04:49,420 --> 00:04:55,440
I'm going to teach you about recursive functions threading and object oriented programming.
56
00:04:55,690 --> 00:05:00,850
And the last part of the section I'm going to show you how to package all of the programs that we've
57
00:05:00,850 --> 00:05:08,270
built so far so that they can run on any operating system on Windows OS X and Linux.
58
00:05:08,320 --> 00:05:13,810
Not only that but I'm also going to show you how to convert these programs into Trojans.
59
00:05:13,810 --> 00:05:21,760
So they look and function just like any other file type like an image or a PTF finally will move to
60
00:05:21,760 --> 00:05:27,250
the Web site hacking section where you learn how websites work and how to communicate with Web sites
61
00:05:27,250 --> 00:05:28,480
using Python.
62
00:05:28,720 --> 00:05:35,980
And then we'll build a number of information gathering programs that can be used to discover files directories
63
00:05:36,130 --> 00:05:43,470
and subdomains that were going to write a program that can be used to get the logging information of
64
00:05:43,560 --> 00:05:47,270
any log in page as we do this.
65
00:05:47,330 --> 00:05:54,430
You're going to learn how to read the Hastey code of any web page analyze it and extract the useful
66
00:05:54,430 --> 00:05:55,580
parts from it.
67
00:05:57,720 --> 00:06:02,070
Finally we're going to build a generic vulnerability scanner.
68
00:06:02,370 --> 00:06:09,980
This is a program that takes a website as an input and scans the whole website for weaknesses and vulnerabilities.
69
00:06:10,020 --> 00:06:15,960
Once done it's going to show us a report of all the discoveries and we're going to write this program
70
00:06:16,020 --> 00:06:22,050
in a way so that it can discover any type of vulnerability as we write this.
71
00:06:22,080 --> 00:06:28,050
We're going to learn more about object oriented programming on how to structure your program in a way
72
00:06:28,230 --> 00:06:30,770
so that it can be easily extended.
8057
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.