Curriculum
12 Sections
53 Lessons
52 Weeks
Expand all sections
Collapse all sections
SEC 1 Preparation - Setting Up The Lab
4
1.1
Installing-windows
2 Minutes
1.2
Snapshots
6 Minutes
1.3
Kali Overview
7 Minutes
1.4
Kali Installing Terminator and Updating
4 Minutes
SEC 2 Network Basics
6
2.1
Networks-basics
3 Minutes
2.2
Adding-usb-to-VM
7 Minutes
2.3
Mac-address
4 Minutes
2.4
Monitor-mode
5 Minutes
2.5
Monitor-mode-method
3 Minutes
2.6
Enabling-monitor-mode-method
4 Minutes
SEC 3 Pre connection attacks
6
3.1
Airodump-basics
5 Minutes
3.2
Targetted-airodump
7 Minutes
3.3
Basic-deauth
4 Minutes
3.4
Fake-ap-theory
3 Minutes
3.5
Fake-ap-practical
10 Minutes
3.6
Mana
9 Minutes
SEC 4 Gsining Access
1
4.1
Gaining-access
1 Minute
SEC 5 Gaining Access WEP Cracking
6
5.1
Gaining-access
1 Minute
5.2
Basic-wep-cracking
5 Minutes
5.3
Fake-auth
6 Minutes
5.4
Arp-request-replay
4 Minutes
5.5
Chopchop
7 Minutes
5.6
Fragment
7 Minutes
Sec 6 Gaining Access - WPAWPA2 Cracking
8
6.1
Wpa-intro
1 Minute
6.2
Wps-cracking
6 Minutes
6.3
Handshake-theory
2 Minutes
6.4
Capturing-handshake
4 Minutes
6.5
Creating-wordlist
5 Minutes
6.6
Wordlist-cracking
3 Minutes
6.7
Airolib-ng
7 Minutes
6.8
Hashcat
6 Minutes
Sec 7 Gaining Access - Security & Mitigation
1
7.1
Sec-done
6 Minutes
Sec 8 Post Connection Attacks
1
8.1
Post-connection-intro
2 Minutes
Sec 9 Post Connection Attacks - Information Gathering
3
9.1
Netdiscover
3 Minutes
9.2
Autoscan
8 Minutes
9.3
Zenmap
10 Minutes
Sec 10 Post Connections Attacks - Man In The Middle Attacks (MITM)
8
10.1
Arpspoof-using-arpspoof
5 Minutes
10.2
Arp-spoofing-using-mitmf
5 Minutes
10.3
Session-hijacking
6 Minutes
10.4
Bypassing-https
4 Minutes
10.5
Dns-spoofing
5 Minutes
10.6
Mitmf-code-injection
6 Minutes
10.7
Mitmf-screenshot-keylogger0
5 Minutes
10.8
Beef-mitmf
9 Minutes
Sec 11 Post Connection Attacks - Gaining Full Control Over Devices On The Same Network
7
11.1
Installing-veil
7 Minutes
11.2
Generating-veil-backdoor
9 Minutes
11.3
Payloads-overview
7 Minutes
11.4
Listening-for-connections
7 Minutes
11.5
Testing-backdoor
7 Minutes
11.6
Creating-a-fake-update
9 Minutes
11.7
General-meterpreter-baics
5 Minutes
sec 12 ARP Poisoning Detection & Security
2
12.1
Detecting-arp-poisonning
5 Minutes
12.2
Detecting-suspecious-behaviour
5 Minutes
Wifi Hacking Penetration Testing From Scratch
Search
Snapshots
https://dwnk32xmy75f1.cloudfront.net/wp-content/uploads/20180926045419/4-snapshots-0.mp4
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content