Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Network Hacking/Penetration Testing From Scratch (WiFi & Wired)
Section 1: Preparation - Setting Up The Lab
Lab Overview & Needed Software (7:48)
Introduction & Course Outline (3:35)
Installing Kali 2020 As a Virtual Machine (10:34)
Creating & Using Snapshots (5:36)
Kali Linux Overview (5:10)
The Linux Terminal & Basic Commands (11:21)
Section 2: Network Basics
Network Basics (4:28)
Connecting a Wireless Adapter To Kali (5:09)
MAC Address - What Is It & How To Change It (8:20)
Wireless Modes (Managed & Monitor mode) (6:57)
Section 3: Pre-Connection Attacks
Packet Sniffing Basics Using Airodump-ng (6:40)
WiFi Bands - 2.4Ghz & 5Ghz Frequencies (7:54)
Targeted Packet Sniffing Using Airodump-ng (10:30)
Deauthentication Attack (Disconnecting Any Device From (6:50)
Section 4: Gaining Access
Gaining Access Introduction (1:09)
Section 5: Gaining Access - WEP Cracking
Theory Behind Cracking WEP Encryption (6:17)
Basic Case (6:17)
Associating With Target Network Using Fake Authentication Attack (6:45)
Packet Injection - ARP Request Reply Attack (6:09)
Packet Injection - Korek Chopchop Attack (7:42)
Packet Injection - Fragmentation Attack (7:44)
Section 6: Gaining Access - WPA/WPA2 Cracking
Introduction to WPA / WPA2 Cracking (3:42)
Exploiting the WPS Feature (10:11)
How to Capture a Handshake (6:49)
Creating a Wordlist / Dictionary (7:33)
Cracking the Key Using a Wordlist (6:26)
Cracking the Key Quicker using a Rainbow Table (7:00)
Cracking WPA/WPA2 Much Faster Using GPU - Part 1 (7:19)
Cracking WPA/WPA2 Much Faster Using GPU - Part 2 (10:38)
Section 7: Gaining Access - Security & Mitigation
Securing Your Network From The Above Attacks
How to Configure Wireless Security Settings To Secure Your Network (6:25)
Section 8: Post Connection Attacks
Post Connection Attacks Introduction (2:10)
Installing Windows As a Virtual machine (2:37)
Section 9: Post Connection Attacks - Information Gathering
Discovering Connected Clients using netdiscover (8:39)
Gathering More Information Using Zenmap (6:45)
Gathering Even More Information Using Zenmap (8:08)
Section 10: Post Connections Attacks - Man In The Middle Attacks (MITM)
ARP Poisoning Theory (9:04)
ARP Poisoning Using arpspoof (6:30)
Bettercap Basics (8:39)
ARP Poisoning Using Bettercap (8:17)
Spying on Network Devices (Capturing Passwords, Visited Websites, etc..) (5:11)
Creating Custom Spoofing Script (9:54)
Understanding HTTPS & How to Bypass it (6:06)
Bypassing HTTPS (7:26)
Bypassing HSTS (10:39)
DNS Spoofing - Redirecting Requests From One Website To Another (10:51)
Injecting Javascript Code (10:26)
Wireshark - Basic Overview & How To Use It With MITM Attacks (8:24)
Wireshark - Sniffing & Analysing Data (5:30)
Wireshark - Using Filters, Tracing & Dissecting Packets (6:28)
Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network (7:48)
Creating a Fake Access Point - Theory (9:05)
Creating a Fake AP Using Mana-Toolkit (10:32)
Section 11: Post Connection Attacks - Gaining Full Control Over Devices On The Same Network
Bonus - Installing Veil 3.1 (6:20)
Bonus - Veil Overview & Payloads Basics (7:20)
Bonus - Generating An Undetectable Backdoor Using Veil 3 (9:44)
Bonus - Listening For Incoming Connections (7:18)
Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 (7:12)
Creating a Fake Update & Hacking Any Client in the Network (11:48)
Meterpreter Basics - Interacting Wit Hacked Clients (5:35)
Section 12: ARP Poisoning Detection & Security
Detecting ARP Poisoning Attacks (5:05)
Detecting Suspicious Activities using Wireshark (5:41)
Wireshark - Basic Overview & How To Use It With MITM Attacks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock