Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,940 --> 00:00:02,140
Hello and welcome.
2
00:00:02,290 --> 00:00:03,440
My name is Zaid.
3
00:00:03,460 --> 00:00:05,980
I'm an ethical hacker, a computer scientist.
4
00:00:05,980 --> 00:00:08,109
And I'll be your instructor in this course.
5
00:00:14,360 --> 00:00:18,980
This course is going to be highly practical, but it won't neglect the theory.
6
00:00:19,190 --> 00:00:21,950
So we'll start by covering some terminology.
7
00:00:21,950 --> 00:00:28,730
Then I'm going to show you how to install the needed software in order to write Python programs and
8
00:00:28,730 --> 00:00:30,440
practice hacking safely.
9
00:00:31,700 --> 00:00:32,630
Throughout the course.
10
00:00:32,630 --> 00:00:38,510
We're going to learn by example, so we'll never have any boring plane program and lectures.
11
00:00:38,510 --> 00:00:41,600
We will always be building something exciting.
12
00:00:41,600 --> 00:00:46,250
And I'm going to teach you programming as we build these exciting programs.
13
00:00:47,060 --> 00:00:50,750
The first program we'll write is a mark changer.
14
00:00:50,930 --> 00:00:55,580
This is a very simple program that can be used to change the Mac address.
15
00:00:56,030 --> 00:01:01,490
Don't worry if you don't know what a mac address is or why you want to change it, we will cover all
16
00:01:01,490 --> 00:01:02,600
of that later on.
17
00:01:02,870 --> 00:01:09,920
Basically, the whole point of writing this program is to introduce you to Python basics such as writing
18
00:01:09,920 --> 00:01:15,620
functions, variables, handling user input checks and so on.
19
00:01:16,310 --> 00:01:22,880
In here you'll learn how to properly model a problem, write an algorithm to solve this problem, and
20
00:01:22,880 --> 00:01:26,510
then write Python code to implement this solution.
21
00:01:26,960 --> 00:01:32,690
Once we have the basics covered, we're going to start writing a little bit more complex programs.
22
00:01:33,200 --> 00:01:39,650
So we'll start with a network scanner, which is a program that can discover all clients connected to
23
00:01:39,650 --> 00:01:45,230
the same network and display their IP address and MAC address in here.
24
00:01:45,230 --> 00:01:51,920
I'm going to introduce you to KP and I'm going to teach you how to send and receive ARP responses and
25
00:01:51,920 --> 00:01:52,790
analyze them.
26
00:01:53,270 --> 00:01:59,930
I will also introduce you to dictionaries and lists and we'll see how to use them and all the operations
27
00:01:59,930 --> 00:02:02,030
that we can invoke on them.
28
00:02:02,630 --> 00:02:05,510
Next, we'll dive deeper into networking.
29
00:02:05,510 --> 00:02:12,830
We're going to learn what r.p is, what it's used for, what is ARP spoofing, and how to write a Python
30
00:02:12,830 --> 00:02:16,130
program to run an ARP spoofing attack.
31
00:02:16,700 --> 00:02:24,260
As we do this, you'll learn more about Skype, analyzing network layers, handling exceptions, loops
32
00:02:24,260 --> 00:02:25,100
and more.
33
00:02:25,520 --> 00:02:29,570
Then we're going to dive even deeper in networking.
34
00:02:29,780 --> 00:02:36,470
So you're going to learn how to sniff data sent or received by any computer connected to the same network
35
00:02:36,470 --> 00:02:37,160
as us.
36
00:02:37,400 --> 00:02:45,590
This means we'll be able to see visited websites, login information, passwords and pretty much everything
37
00:02:45,590 --> 00:02:47,570
they do on the internet.
38
00:02:48,600 --> 00:02:55,680
You'll also learn how to analyze data sent in the different layers in each packet and how to modify
39
00:02:55,680 --> 00:02:56,490
this data.
40
00:02:57,270 --> 00:03:04,500
So we'll be able to inject code and HTML pages loaded by any computer on the same network.
41
00:03:04,530 --> 00:03:11,880
We'll be able to replace downloads and even spoof DNS requests to any destination we want.
42
00:03:12,580 --> 00:03:20,590
We'll learn all of this by writing a sniffer, a dense puffer, a code injector and a file interceptor.
43
00:03:21,280 --> 00:03:27,160
Once done with all of this, we'll move to a really exciting section where you'll learn how to write
44
00:03:27,160 --> 00:03:27,880
malware.
45
00:03:28,450 --> 00:03:35,170
We'll start with writing simple evil programs so programs that can download the file, execute code,
46
00:03:35,170 --> 00:03:41,830
send a report by email, and then I'm going to show you how to combine all of these programs to suit
47
00:03:41,830 --> 00:03:45,280
different scenarios and execute powerful attacks.
48
00:03:45,820 --> 00:03:52,300
Then we're going to advance into writing more complex malware, and we'll start by writing a backdoor.
49
00:03:53,140 --> 00:03:59,740
A backdoor is a program that gives you full control over the system that it gets executed on.
50
00:04:00,400 --> 00:04:05,590
We're going to implement this using sockets and you're going to learn how to establish a connection
51
00:04:05,590 --> 00:04:10,000
between two devices and transfer data between them.
52
00:04:10,750 --> 00:04:16,180
This is very useful because it can be used in so many other scenarios other than hacking.
53
00:04:16,180 --> 00:04:21,040
So you can use it to create a web server, a chat program and so on.
54
00:04:21,990 --> 00:04:28,050
Then we're going to build more cool features in this backdoor so that we can use it to execute system
55
00:04:28,050 --> 00:04:35,370
commands remotely on the target computer, download and upload files and maintain our access even if
56
00:04:35,370 --> 00:04:36,750
the system restarts.
57
00:04:37,680 --> 00:04:44,310
Then we will implement a keylogger, which is a program that registers every keystroke entered on the
58
00:04:44,310 --> 00:04:47,820
keyboard and send us a report by email.
59
00:04:48,480 --> 00:04:54,960
As we do this, I'm going to teach you about recursive functions, threading and object oriented programming.
60
00:04:55,560 --> 00:05:01,110
In the last part of the section, I'm going to show you how to package all of the programs that we built
61
00:05:01,110 --> 00:05:07,740
so far so that they can run on any operating system on Windows, OSX and Linux.
62
00:05:08,070 --> 00:05:14,550
Not only that, but I'm also going to show you how to convert these programs into Trojans so they look
63
00:05:14,550 --> 00:05:19,290
and function just like any other file type, like an image or a PDF.
64
00:05:20,310 --> 00:05:26,460
Finally, we'll move to the website hacking section where you learn how websites work and how to communicate
65
00:05:26,460 --> 00:05:28,440
with websites using Python.
66
00:05:28,440 --> 00:05:35,100
And then we'll build a number of information gathering programs that can be used to discover files,
67
00:05:35,100 --> 00:05:37,230
directories and subdomains.
68
00:05:38,380 --> 00:05:45,010
Then we're going to write a program that can be used to guess the login information of any login page.
69
00:05:46,180 --> 00:05:53,740
As we do this, you're going to learn how to read the HTML code of any web page, analyze it, and extract
70
00:05:53,740 --> 00:05:55,480
the useful parts from it.
71
00:05:57,600 --> 00:06:01,920
Finally, we're going to build a generic vulnerability scanner.
72
00:06:02,130 --> 00:06:09,540
This is a program that takes a website as an input and scans the whole website for weaknesses and vulnerabilities.
73
00:06:09,810 --> 00:06:14,130
Once done, it's going to show us a report of all the discoveries.
74
00:06:14,130 --> 00:06:20,220
And we're going to write this program in a way so that it can discover any type of vulnerability.
75
00:06:20,850 --> 00:06:26,670
As we write this, you're going to learn more about object oriented programming and how to structure
76
00:06:26,670 --> 00:06:30,930
your program in a way so that it can be easily extended.
8233
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.