Curriculum
12 Sections
81 Lessons
52 Weeks
Expand all sections
Collapse all sections
1. Introduction
1
1.1
Teaser – Converting Downloads To Trojans On The Fly & Hacking Windows 10
6 Minutes
2. Back To Basics/Pre-Connection Attacks
6
2.1
Pre-connection Attacks Overview
1 Minute
2.2
Spoofing Mac Address Manually
3 Minutes
2.3
Targeting 5 GHz Networks
6 Minutes
2.4
Deauthenticating a Client From Protected WiFi Networks
6 Minutes
2.5
Deauthenticating Multiple Clients From Protected WiFi Networks
7 Minutes
2.6
Deauthenticating All Clients From Protected WiFi Network
6 Minutes
3. Gaining Access
6
3.1
Gaining Access Overview
3 Minutes
3.2
Discovering Names of Hidden Networks
8 Minutes
3.3
Connecting To Hidden Networks
5 Minutes
3.4
Bypassing Mac Filtering (Blacklists & Whitelists)
9 Minutes
3.5
Cracking SKA WEP Networks
9 Minutes
3.6
Securing systems from the above attacks
3 Minutes
4. Gaining access captive portals
13
4.1
Sniffing Captive Portal Logins Information In Monitor Mode
9 Minutes
4.2
Sniffing Captive Portal Logins Information using ARP Spoofing
8 Minutes
4.3
Creating a Fake Captive Portal- Introduction
4 Minutes
4.4
Creating a Login Page- Cloning a Login Page
7 Minutes
4.5
Creating a Login Page- Fixing Relative Links
7 Minutes
4.6
Creating A Login Page- Adding Form Tag
6 Minutes
4.7
Creating A Login Page- Adding Submit Buttton
7 Minutes
4.8
Preparing Computer To Run Fake Captive Portal
6 Minutes
4.9
Starting the Fake Captive Portal
11 Minutes
4.10
Redirecting Requests To Captive Portal Login Page
12 Minutes
4.11
Generating Fake SSL Certificate
5 Minutes
4.12
Enabling SSL/HTTPS On Webserver
7 Minutes
4.13
Sniffing & Analysing Login Credentials
6 Minutes
5. Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
5
5.1
Exploiting WPS – Introduction
1 Minute
5.2
Bypassing “Failed to associate” Issue
7 Minutes
5.3
Bypassing 0x3 and 0x4 Errors
7 Minutes
5.4
WPS Lock – What Is It & How To Bypass It
7 Minutes
5.5
Unlocking WPS
8 Minutes
6. Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
6
6.1
Advanced Wordlist Attacks – Introduction
1 Minute
6.2
Saving Aircrack-ng Cracking Progress
9 Minutes
6.3
Using Huge Wordlists With Aircrack-ng Without Wasting Storage
7 Minutes
6.4
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
10 Minutes
6.5
Cracking WPA/WPA2 Much Faster Using GPU – Part 1
7 Minutes
6.6
Cracking WPA/WPA2 Much Faster Using GPU – Part 2
10 Minutes
7. Gaining Access - WPA/WPA Cracking - Evil Twin Attack
4
7.1
What is it and How it works
7 Minutes
7.2
Installing Needed Software
7 Minutes
7.3
Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing
9 Minutes
7.4
Debugging & Fixing Login Interface
11 Minutes
8. Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
5
8.1
What is WPA/WPA2 Enterprise & How it Works
5 Minutes
8.2
How To Hack WPA/WPA2 Enterprise
6 Minutes
8.3
Stealing Login Credentials
8 Minutes
8.4
Cracking Login Credentials
6 Minutes
8.5
Securing Systems From The Above Gaining Access Attacks
4 Minutes
9. Post Connection Attacks
7
9.1
Post Connection Attacks Overview
4 Minutes
9.2
Ettercap- Basic Overview
7 Minutes
9.3
Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
9 Minutes
9.4
Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites
12 Minutes
9.5
Automatically ARP Poisoning New Clients
6 Minutes
9.6
DNS Spoofing Using Ettercap
5 Minutes
9.7
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
9 Minutes
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
10
10.1
MITMproxy – What is It & How To Install It
3 Minutes
10.2
Using MITMproxy In Explicit Mode
7 Minutes
10.3
Analysing (Filtering & Highlighting) Flows
5 Minutes
10.4
Intercepting Network Flows
4 Minutes
10.5
Modifying Responses & Injecting Javascript Manually
8 Minutes
10.6
Intercepting & Modifying Responses In Transparent Mode
7 Minutes
10.7
Editing Responses & Injecting BeEF’s Code On The Fly
9 Minutes
10.8
Editing Responses Automatically Based On Regex
9 Minutes
10.9
[Bonus] – Stealing Login Info Using Fake Login Prompt
7 Minutes
10.10
[Bonus] – Hacking Windows 10 Using A Fake Update
4 Minutes
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
14
11.1
What Do Mean By MITM Scripts?
6 Minutes
11.2
Capturing & Printing Requests/Responses
8 Minutes
11.3
Filtering Flows & Extracting Useful Data
9 Minutes
11.4
Using Conditions To Execute Code On Useful Flows
9 Minutes
11.5
Generating Custom HTTP Responses
8 Minutes
11.6
Testing Script Locally
8 Minutes
11.7
Generating Trojan- Installing The Trojan Family
6 Minutes
11.8
Generating Trojan- Converting Any File (eg:image) To a Trojan
10 Minutes
11.9
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
7 Minutes
11.10
Executing Bash Commands & Calling Trojan Factory From Our Script
8 Minutes
11.11
Using Variables & More Complex Conditions
8 Minutes
11.12
Converting Downloads To Trojans On The Fly
10 Minutes
11.13
Configuring The Trojan Factory’s MITMproxy Script
7 Minutes
11.14
Using The Trojan Factory MITMproxy Script
7 Minutes
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
4
12.1
Bypassing HTTPS With MITMproxy
6 Minutes
12.2
Replacing Downloads From HTTPS
5 Minutes
12.3
Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites
6 Minutes
12.4
Securing Systems From The Above Post Connection Attacks
5 Minutes
Learn Network Hacking Continued Intermediate To Advanced
Search
Pre-connection Attacks Overview
https://dwnk32xmy75f1.cloudfront.net/wp-content/uploads/20180925102311/1-33.mp4
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content