1 00:00:00,150 --> 00:00:00,810 Hello everybody. 2 00:00:00,960 --> 00:00:03,330 And welcome back to this tutorial. 3 00:00:03,330 --> 00:00:07,260 Now this will be the last video of the Intermediate section. 4 00:00:07,440 --> 00:00:12,650 We have covered a bunch of other topics and such as well penetration testing system hacking. 5 00:00:12,660 --> 00:00:16,510 Man in the middle attacks borderless network attacks. 6 00:00:17,040 --> 00:00:23,880 And bunch of these things that you need to know in order to be able to call yourself an intermediate 7 00:00:23,880 --> 00:00:24,880 hacker. 8 00:00:24,930 --> 00:00:28,350 Now that is just a part of it of course. 9 00:00:28,650 --> 00:00:33,840 You will need lots and lots of practice of all of these methods on different types of targets. 10 00:00:33,870 --> 00:00:39,740 And everywhere you basically can you need to practice them since practice makes perfect. 11 00:00:39,840 --> 00:00:44,040 And in the next section we will finally enter our coding section. 12 00:00:44,070 --> 00:00:46,540 We will cover a little bit of Python and see. 13 00:00:46,680 --> 00:00:50,640 I will give you a small crash course on both of these programming languages. 14 00:00:50,640 --> 00:00:56,460 Now you shouldn't really expect it to uh fully understand it from that crash course since it will be 15 00:00:56,460 --> 00:00:56,910 short. 16 00:00:56,910 --> 00:01:01,940 I will only explain a few things if you want to be able to fully uh follow that. 17 00:01:01,950 --> 00:01:08,610 You might want to search additional videos here and there for python and see uh. 18 00:01:08,800 --> 00:01:14,040 And but if you already know some of these programming languages or basically any other programming language 19 00:01:14,070 --> 00:01:17,180 it will be easy for you to understand this. 20 00:01:17,210 --> 00:01:23,110 Yeah we'll be calling as I said our advance back door in Python. 21 00:01:23,250 --> 00:01:30,060 We will try to replicate some of the uh some of the options that for example an interpreter shall has 22 00:01:30,150 --> 00:01:36,870 such a screen shorting key logger then coping files persistence so we can actually enter the machine 23 00:01:36,870 --> 00:01:43,050 whenever we want after the reboot shut down and all of the things we can upload download files and all 24 00:01:43,050 --> 00:01:43,590 of that. 25 00:01:43,620 --> 00:01:45,070 Interesting stuff. 26 00:01:45,150 --> 00:01:56,310 Now as I said You will need to uh know these languages in order to be able to follow these better the 27 00:01:56,340 --> 00:02:01,370 crash course will cover some of the basics such as some uh some of the simple python programs some of 28 00:02:01,370 --> 00:02:05,340 the simple python modules C programs and so on and so on. 29 00:02:05,550 --> 00:02:12,600 And after that we will actually start decoding of our backdoor and our other programs that we need. 30 00:02:12,600 --> 00:02:15,930 So that will be about it for this section. 31 00:02:15,930 --> 00:02:19,340 Hope you enjoyed it and hope you learned a lot from it. 32 00:02:19,350 --> 00:02:22,040 Make sure to practice it as much as you can. 33 00:02:22,080 --> 00:02:24,960 And I hope I see you in the next section by.