Since Geoff and some other guy posted coupons for udemy.org discounts, I tried to extract all video links from a course.
With this script you are able to extract the "Solid Introduction to Ethical Hacking and Penetration Testing" course from udemy.
The only "limitation" of it, is the fact that you have to buy the courses first (or get access to a valid cookie which have the courses you want,
or
100% off coupon,
more 100% off coupons), to be able to extract the links. You need to manually fill out the cookie dict on line
L17 and enter the URL,
you want to scrape from, at the bottom of the script on line
L115.
I couldn't be bothered to take care of all the various login routines for the site, so you have to do some dirty work.
Unless you want to modify the source that is.
[gist]Daxda/d1b9e535b9aced2450cc[/gist]
Example output:
Section 1. Solid Introduction to Ethical Hacking and Penetration Testing
Chapter 1. About the course
File name: Intro.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-34-7bf522b269e5ff8cd7e3b0c5200c1254/WebHD_720p.mp4?__gda__=1405633327_ef25fbdfa32f33faa6f5b32a009e80b2&filedownload=attachment%3Bfilename%3Dintromp4.mp4
Chapter 2. Hacking vs Ethical Hacking
File name: hacking_vs_ethical_hacking.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-31-54ea765817edd834a9e12d202a3c91fd/WebHD_720p.mp4?__gda__=1405633327_d34925cf2e59c2ad3c166b7c228e6343&filedownload=attachment%3Bfilename%3Dhacking_vs_ethical_hackingmp4.mp4
Chapter 3. Who is a Hacker ?
File name: hacker_def.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-35-1ef8ba7ccb507e462b0e2f312a75734b/WebHD_720p.mp4?__gda__=1405633329_f901b01c40d7e1ed8e32dfed7fe1b2b6&filedownload=attachment
Chapter 4. Types of Hackers
File name: types_of_hackers.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-31-38-4473ae9aabc6d12f545c415acc776b38/WebHD_720p.mp4?__gda__=1405633330_968e467f33b34e1d727f8a9e69657292&filedownload=attachment
Chapter 5. Hacktivism
File name: hacktivism.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-09-e1ece5d5151c24417daad579e350187e/WebHD_720p.mp4?__gda__=1405633330_e07dde57e3243969ac58e9e45f6b5f4d&filedownload=attachment
Chapter 6. Computer Crimes
File name: computer_crimes.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-30-11-6a371e23b8b06801b071e265ff2a5451/WebHD_720p.mp4?__gda__=1405633331_3ad47c63f467ce5754c0c50c55f6276d&filedownload=attachment
Chapter 7. Important Terms 1
File name: Important Terms 1
Link: https://sknowbucket-a.akamaihd.net/2013-10-17_10-23-52-5dd4eaef148cdfeca88e33f9c64cb1b2/WebHD_720p.mp4?__gda__=1405633327_9aaa81ed7803bdbeca1fbc28c305bcb0&filedownload=attachment%3Bfilename%3Dimportant-terms-1.mp4
Chapter 8. Important Terms 2
File name: Important Terms 2
Link: https://sknowbucket-a.akamaihd.net/2013-10-17_10-27-57-bba20df22f12b4e2c5154f78964ccc9b/WebHD_720p.mp4?__gda__=1405633331_167ae0893ff873e25fa257a7f969709e&filedownload=attachment
Chapter 9. Why Penetration Testing ?
File name: Why Pentest
Link: https://sknowbucket-a.akamaihd.net/2013-10-19_07-42-18-4fde9bf6cd6ff8e0439de030ee05746d/WebHD_720p.mp4?__gda__=1405633327_d1420e1c02e0b162614ddc60e57e03eb&filedownload=attachment%3Bfilename%3Dwhy-pentest.mp4
Chapter 10. Penetration Testing Types
File name: Pentest Types
Link: https://sknowbucket-a.akamaihd.net/2013-10-19_07-46-07-20a37118e33a48e86f961d3a70303f8c/WebHD_720p.mp4?__gda__=1405633332_5c588bb2d5fd8d7b605a30a7e27c2006&filedownload=attachment
Section 2. Real World Information Intelligence Techniques
Chapter 11. Introduction to Information Intelligence Techniques
File name: Module2RealWorldInformationIntelligenceTechniques.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-37-10-0842b3c32f853ff4d63bf34fff815871/WebHD_720p.mp4?__gda__=1405633332_edc5ce7ea852d3a7aaa370e16ee78034&filedownload=attachment
Chapter 12. organizing information during a penetration test
File name: organizinginformationduringapenetrationtest.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-41-079e30176fcce1ac705271f61332cf2c/WebHD_720p.mp4?__gda__=1405633333_5677739b53d5347995dbb4684f80abf0&filedownload=attachment
Chapter 13. how to locally copying company websites
File name: locallycopyingcompanywebsites.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-34-45-8b90bcc134c59b1c03f7cf738c06668d/WebHD_720p.mp4?__gda__=1405633333_eeb162863162e2acc8bfc697d5f213fc&filedownload=attachment
Chapter 14. newsgroups and list-servers
File name: newsgroupsandlistservers.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-18-b6caaca940dfc0df12a0329d3aeab500/WebHD_720p.mp4?__gda__=1405633333_30ce6d72caa84de5697f5ae23b6b4233&filedownload=attachment
Chapter 15. online job listing
File name: onlinejoblisting.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-29-05-6c5d3d5fe49b29e1b5dfca43d17ec3e3/WebHD_720p.mp4?__gda__=1405633334_17df81f31125dd95143d0bf6428ddcf7&filedownload=attachment
Chapter 16. the power of social media websites
File name: thepowerofsocialmediawebsites.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-57-25-eb883a97adc20934bff8ca155d519386/WebHD_720p.mp4?__gda__=1405633334_dc747bed1191767a15ae8bfbbe9b188b&filedownload=attachment
Chapter 17. harvesting a company emails
File name: harvestingacompanyemails.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-57-25-00c33e21a9bdf11f34c0ffb2459981b1/WebHD_720p.mp4?__gda__=1405633335_6d7fc73afe01a392de58247dcc00a529&filedownload=attachment
Chapter 18. how to generate a targeted wordlist for password cracking
File name: generateatargetedwordlistforpasswordcracking.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-57-07-4b3a4ba00c3acb3d69a4d8c4929638c4/WebHD_720p.mp4?__gda__=1405633335_944c4b599b3e6b828205bcec973ca259&filedownload=attachment
Chapter 19. information intelligence with Maltego
File name: informationintelligencewithMaltego.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-40-02-0f6ccec6289b617b08bf1761ab299354/WebHD_720p.mp4?__gda__=1405633336_409dcbffe6982340d8b93a9d625104d9&filedownload=attachment
Chapter 20. Google Search Techniques for penetration testers
File name: GoogleSearchTechniquesforpenetrationtesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-46-45-52961f997a4535a7abff091be7a0e9b9/WebHD_720p.mp4?__gda__=1405633336_8590a103a67540396c2fccdbdb3cb782&filedownload=attachment
Chapter 21. other search engines for penetration testers
File name: Othersearchenginesforpenetrationtesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-26-f73f415bec0dfd8e86a4ab6e65da9498/WebHD_720p.mp4?__gda__=1405633337_06a3de0b51a7ef8caae20270f03999dc&filedownload=attachment
Chapter 22. Enumerating Internal Network From Outside
File name: EnumeratingInternalNetworkFromOutside.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-10-22-1eb47c83fea468299e58000430627783/WebHD_720p.mp4?__gda__=1405633337_2dcb3f682188ab65b1f6092334c3249d&filedownload=attachment
Chapter 23. gather information using WhatWeb, HttpRecon and SSL SCAN
File name: WhatWebHttpReconandSSLSCAN.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-00-54-0f051ced02577053a29fbb525d575653/WebHD_720p.mp4?__gda__=1405633338_7e0542e63718dc58002f1f5a40e31684&filedownload=attachment
Chapter 24. Whois Lookups, finding other Web Sites Hosted on a Web Server
File name: Whoisandotherwebsites.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-58-44-fe1e23878431e05e4be8b3c85b44211e/WebHD_720p.mp4?__gda__=1405633338_c3f49ce95ff57ddb20c5eeac35eb4179&filedownload=attachment
Chapter 25. IP Address Geolocation
File name: IPAddressGeolocation.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-54-19-d1cb3251403bef64225a2da11f930785/WebHD_720p.mp4?__gda__=1405633339_279940e07a17ff9ea0d95000547f5320&filedownload=attachment
Chapter 26. finding subdomains, extracting exif data and finding hidden web dirs
File name: findingsubdomainsexifdataandrobots.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-59-12-3ab312685fa771da694849989975bfdb/WebHD_720p.mp4?__gda__=1405633339_c6ef71c927fc714a87987afd0e60112d&filedownload=attachment
Chapter 27. ShodanHQ for fun and profit
File name: ShodanHQforfunandprofit.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-58-37-b47408d62dca66a53be97b172533a2ff/WebHD_720p.mp4?__gda__=1405633328_b0c686f0249c294962b823208867b43d&filedownload=attachment%3Bfilename%3Dshodanhqforfunandprofitmp4.mp4
Chapter 28. Web Application Firewall Detection, HTTP and DNS load balancer detection
File name: WAFandLoadBalancersDetection.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-36-09-7a48ff856ed417db45cd1613f8a043da/WebHD_720p.mp4?__gda__=1405633340_0ac879dc2d450864830ce43ef6e1bee6&filedownload=attachment
Chapter 29. DNS Enumerating for penetration testers
File name: DNSEnumerating.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-12-16-bf772604b02808cd5caa593ad478c5cc/WebHD_720p.mp4?__gda__=1405633340_b37f86ce2dfb7c95a1857a28d66aafab&filedownload=attachment
Chapter 30. Mail Server Enumeration for penetration testers
File name: EnumeratingMailServer.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-53-20-f87eb1767e1c349976fc40a6d935927e/WebHD_720p.mp4?__gda__=1405633341_622c08463f9678183c8acea827907eb6&filedownload=attachment
Chapter 31. Intel Gathering Methodology for penetration testers
File name: IntelGatheringMethodology.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-38-06-27b8159caa30b8a1cb10068c01f3f1f9/WebHD_720p.mp4?__gda__=1405633341_f3744acec514ce11a23fed8bf88736ff&filedownload=attachment
Section 3. Scanning and vulnerability Assessment
Chapter 32. packet Crafting and Manipulating with Scapy
File name: PacketCraftingandManipulatingwithScapy.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-59-12-cf21674c636b66676c0ec24f745ea699/WebHD_720p.mp4?__gda__=1405633342_0f8b0922524d3da9472df81ac18a6bd1&filedownload=attachment
Chapter 33. port scanning with scapy
File name: portscanningwithscapy.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-28-cdb4fdafeedb2d33b0050d418cbee043/WebHD_720p.mp4?__gda__=1405633328_362c9cf7ac8bc6784a4509b4c11fa280&filedownload=attachment%3Bfilename%3Dportscanningwithscapymp4.mp4
Chapter 34. Network Enumeration and Mapping Techniques
File name: NetworkEnumerationandMapping.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-38-28-5b869517c7aae103de2e3e609e260ad7/WebHD_720p.mp4?__gda__=1405633342_fedb0325fb6f1db5bd7c8b2e64a0d108&filedownload=attachment
Chapter 35. Network scanning techniques
File name: networkscaning.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-04-36-d13cea9d2d62e7f46c39c3ad63610692/WebHD_720p.mp4?__gda__=1405633343_038ef25df0f5429d972c83e2883911d9&filedownload=attachment
Chapter 36. Vulnerability Identification and Assessment techniques
File name: VulnerabilityIdentificationandAssessment.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-37-04-6cd5ac881a3927401a9732d9db284cc6/WebHD_720p.mp4?__gda__=1405633343_d59b4f4deea4acaa994ab56476bce28d&filedownload=attachment
Chapter 37. Practical Evasion and avoidance Techniques
File name: EvasionandavoidanceTechniques.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-11-28-8c6fabb19a5f8ac85672786f8b306c6b/WebHD_720p.mp4?__gda__=1405633343_980c45c2bde1af1ccc3b62e262ecb3e2&filedownload=attachment
Section 4. Network Attacking Techniques
Chapter 38. Password cracking, MITM, Sniffing SSL and RDP Attacks
File name: module4.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-04-56-393b234b3a01e61bfb72f91031b1db86/WebHD_720p.mp4?__gda__=1405633344_b63233fbafc86c1ececa8a4f6377a8e2&filedownload=attachment
Section 5. Windows and Linux Attacking Techniques
Chapter 39. Windows Security Overview for Penetration Testers
File name: WindowsSecurityOverviewforPenetrationTesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-54-10-7f5f4262bce22d65479122a05f5aefbb/WebHD_720p.mp4?__gda__=1405633344_8338e8398d551c219feff06e8f8faab6&filedownload=attachment
Chapter 40. Linux Security Overview for Penetration Testers
File name: UnixSecurityOverviewforPenetrationTesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-48-55-ee6ffd440246ae961aaae83b81438e67/WebHD_720p.mp4?__gda__=1405633346_a5fc5c07eec9133c52202475872efb46&filedownload=attachment
Chapter 41. Attacking and Hacking Windows
File name: AttackingWindows.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-14-25-a76aa25fa37624873f4b32ef8dfc29ff/WebHD_720p.mp4?__gda__=1405633346_8828abdce7a9db7ea94b0cdef8319397&filedownload=attachment
Chapter 42. Attacking and Hacking Linux
File name: AttackingUnix.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-11-27-4e9b6ae0f4831efd8cde29901a2a57f3/WebHD_720p.mp4?__gda__=1405633347_a0293cddef422a7b699d43185ad4e08a&filedownload=attachment
Section 6. Windows and Linux Post-Exploitation Techniques
Chapter 43. Windows post exploitation techniques
File name: TacticalPostExploitationTechniquesWindows.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-03-47-2558a5d56bba644970d47cbc9318ec38/WebHD_720p.mp4?__gda__=1405633347_291748ffc0dd36de038527aa41379284&filedownload=attachment
Chapter 44. Linux post exploitation techniques
File name: TacticalPostExploitationTechniquesUnix.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-04-12-48e6a374c4e53da5a6dcaab4e40f9400/WebHD_720p.mp4?__gda__=1405633348_370453631dbe32d6a22e96b71f744557&filedownload=attachment
Chapter 45. Data mining techniques
File name: datamining.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-08-57-c312b7ae53c9c1788f674e5fc5a138ca/WebHD_720p.mp4?__gda__=1405633348_5e444c134fe053701a717a88d4cb9571&filedownload=attachment
Section 7. Web Exploitation Techniques
Chapter 46. Web Application Primer
File name: WebApplicationPrimer.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-55-58-9eb5009c123e14ba51b427c4b4a38054/WebHD_720p.mp4?__gda__=1405633349_245ebaa07a433bf60b5088ff808f18b0&filedownload=attachment
Chapter 47. Web Application Scanning and Mapping
File name: WebApplicationScanningandMapping.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-56-29-8d0c95a1bf1984a73ea72acfe6a91bfe/WebHD_720p.mp4?__gda__=1405633349_2fcd584e340bba87c5bd3fbd5d89c603&filedownload=attachment
Chapter 48. Exploiting SQL Injection to Full System Access (MYSQL)
File name: ExploitingSQLInjectionMYSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-07-33-94075a6fc2b93fd1b1577eacdb7abe0d/WebHD_720p.mp4?__gda__=1405633328_944fda129506961408913c40a5722904&filedownload=attachment%3Bfilename%3Dexploitingsqlinjectionmysqltofullsystemaccessmp4.mp4
Chapter 49. Exploiting SQL Injection to Full System Access (MSSQL)
File name: ExploitingSQLInjectionMSSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-53-16-3b0cfd0318044e9de46627f2790747cd/WebHD_720p.mp4?__gda__=1405633350_9e2f1bd840ce7b134fd9619a08294914&filedownload=attachment
Chapter 50. Exploiting Blind SQL Injection to Full System Access (MYSQL)
File name: ExploitingBlindSQLInjectionMYSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-11-14-ce7b8cfa132b7383777e17c8a70fd3c5/WebHD_720p.mp4?__gda__=1405633350_2bc7f694db243c7f181ac0df507278b5&filedownload=attachment
Chapter 51. Exploiting Blind SQL Injection to Full System Access (MSSQL)
File name: ExploitingBlindSQLInjectionMSSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-03-07-a9c430be43d02e6323e2a1765ce857c6/WebHD_720p.mp4?__gda__=1405633351_31fd04fbdeaafcb5f7a75693e41a1d8c&filedownload=attachment
Chapter 52. Exploiting RFI, Local File include, File Uploads and RCE
File name: ExploitingFilehandlingandcmdexecvulns.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-12-16-9313125c96f240a67e8748ef74773c8c/WebHD_720p.mp4?__gda__=1405633351_2089972431bf6d72ac1a655bb8e88ec0&filedownload=attachment
Chapter 53. Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access
File name: ExploitingXSSandCSRF.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-02-49-75f95af78854dbb70ba1b74b9a30d6f5/WebHD_720p.mp4?__gda__=1405633352_1cc4380ca2e57d8e68d82a838f9ad632&filedownload=attachment
Section 8. Windows Exploit Development
Chapter 54. Using Immunity Debugger and Metasploit to develop a windows exploit
File name: Module8Windowsexploitdevelopment.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-08-20-7af8d95e3f18436d5ad97d80a6b2a8d8/WebHD_720p.mp4?__gda__=1405633352_2f5b774ad9431ae7caf5914fa4a6a2d6&filedownload=attachment
Section 9. The end but it is not the end :)
Chapter 55. The end
File name: Final
Link: https://sknowbucket-a.akamaihd.net/2013-10-01_15-57-44-b9b8ee680f7b084642adbac6bc559580/WebHD_720p.mp4?__gda__=1405633353_433c9d6a9c17d49ae6c4f1b9989ca9fe&filedownload=attachment