Curriculum
12 Sections
81 Lessons
52 Weeks
Expand all sections
Collapse all sections
1. Introduction
1
1.1
Teaser – Converting Downloads To Trojans On The Fly & Hacking Windows 10
6 Minutes
2. Back To Basics/Pre-Connection Attacks
6
2.1
Pre-connection Attacks Overview
1 Minute
2.2
Spoofing Mac Address Manually
3 Minutes
2.3
Targeting 5 GHz Networks
6 Minutes
2.4
Deauthenticating a Client From Protected WiFi Networks
6 Minutes
2.5
Deauthenticating Multiple Clients From Protected WiFi Networks
7 Minutes
2.6
Deauthenticating All Clients From Protected WiFi Network
6 Minutes
3. Gaining Access
6
3.1
Gaining Access Overview
3 Minutes
3.2
Discovering Names of Hidden Networks
8 Minutes
3.3
Connecting To Hidden Networks
5 Minutes
3.4
Bypassing Mac Filtering (Blacklists & Whitelists)
9 Minutes
3.5
Cracking SKA WEP Networks
9 Minutes
3.6
Securing systems from the above attacks
3 Minutes
4. Gaining access captive portals
13
4.1
Sniffing Captive Portal Logins Information In Monitor Mode
9 Minutes
4.2
Sniffing Captive Portal Logins Information using ARP Spoofing
8 Minutes
4.3
Creating a Fake Captive Portal- Introduction
4 Minutes
4.4
Creating a Login Page- Cloning a Login Page
7 Minutes
4.5
Creating a Login Page- Fixing Relative Links
7 Minutes
4.6
Creating A Login Page- Adding Form Tag
6 Minutes
4.7
Creating A Login Page- Adding Submit Buttton
7 Minutes
4.8
Preparing Computer To Run Fake Captive Portal
6 Minutes
4.9
Starting the Fake Captive Portal
11 Minutes
4.10
Redirecting Requests To Captive Portal Login Page
12 Minutes
4.11
Generating Fake SSL Certificate
5 Minutes
4.12
Enabling SSL/HTTPS On Webserver
7 Minutes
4.13
Sniffing & Analysing Login Credentials
6 Minutes
5. Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
5
5.1
Exploiting WPS – Introduction
1 Minute
5.2
Bypassing “Failed to associate” Issue
7 Minutes
5.3
Bypassing 0x3 and 0x4 Errors
7 Minutes
5.4
WPS Lock – What Is It & How To Bypass It
7 Minutes
5.5
Unlocking WPS
8 Minutes
6. Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
6
6.1
Advanced Wordlist Attacks – Introduction
1 Minute
6.2
Saving Aircrack-ng Cracking Progress
9 Minutes
6.3
Using Huge Wordlists With Aircrack-ng Without Wasting Storage
7 Minutes
6.4
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
10 Minutes
6.5
Cracking WPA/WPA2 Much Faster Using GPU – Part 1
7 Minutes
6.6
Cracking WPA/WPA2 Much Faster Using GPU – Part 2
10 Minutes
7. Gaining Access - WPA/WPA Cracking - Evil Twin Attack
4
7.1
What is it and How it works
7 Minutes
7.2
Installing Needed Software
7 Minutes
7.3
Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing
9 Minutes
7.4
Debugging & Fixing Login Interface
11 Minutes
8. Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
5
8.1
What is WPA/WPA2 Enterprise & How it Works
5 Minutes
8.2
How To Hack WPA/WPA2 Enterprise
6 Minutes
8.3
Stealing Login Credentials
8 Minutes
8.4
Cracking Login Credentials
6 Minutes
8.5
Securing Systems From The Above Gaining Access Attacks
4 Minutes
9. Post Connection Attacks
7
9.1
Post Connection Attacks Overview
4 Minutes
9.2
Ettercap- Basic Overview
7 Minutes
9.3
Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
9 Minutes
9.4
Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites
12 Minutes
9.5
Automatically ARP Poisoning New Clients
6 Minutes
9.6
DNS Spoofing Using Ettercap
5 Minutes
9.7
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
9 Minutes
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
10
10.1
MITMproxy – What is It & How To Install It
3 Minutes
10.2
Using MITMproxy In Explicit Mode
7 Minutes
10.3
Analysing (Filtering & Highlighting) Flows
5 Minutes
10.4
Intercepting Network Flows
4 Minutes
10.5
Modifying Responses & Injecting Javascript Manually
8 Minutes
10.6
Intercepting & Modifying Responses In Transparent Mode
7 Minutes
10.7
Editing Responses & Injecting BeEF’s Code On The Fly
9 Minutes
10.8
Editing Responses Automatically Based On Regex
9 Minutes
10.9
[Bonus] – Stealing Login Info Using Fake Login Prompt
7 Minutes
10.10
[Bonus] – Hacking Windows 10 Using A Fake Update
4 Minutes
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
14
11.1
What Do Mean By MITM Scripts?
6 Minutes
11.2
Capturing & Printing Requests/Responses
8 Minutes
11.3
Filtering Flows & Extracting Useful Data
9 Minutes
11.4
Using Conditions To Execute Code On Useful Flows
9 Minutes
11.5
Generating Custom HTTP Responses
8 Minutes
11.6
Testing Script Locally
8 Minutes
11.7
Generating Trojan- Installing The Trojan Family
6 Minutes
11.8
Generating Trojan- Converting Any File (eg:image) To a Trojan
10 Minutes
11.9
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
7 Minutes
11.10
Executing Bash Commands & Calling Trojan Factory From Our Script
8 Minutes
11.11
Using Variables & More Complex Conditions
8 Minutes
11.12
Converting Downloads To Trojans On The Fly
10 Minutes
11.13
Configuring The Trojan Factory’s MITMproxy Script
7 Minutes
11.14
Using The Trojan Factory MITMproxy Script
7 Minutes
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
4
12.1
Bypassing HTTPS With MITMproxy
6 Minutes
12.2
Replacing Downloads From HTTPS
5 Minutes
12.3
Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites
6 Minutes
12.4
Securing Systems From The Above Post Connection Attacks
5 Minutes
Learn Network Hacking Continued Intermediate To Advanced
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content