Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Network Hacking From Scratch (WiFi & Wired)
Training Overview
Description of Training
Video Overview (2:19)
Section 0.
Introduction & Course Outline (3:35)
Section 1. Preparation - Setting Up The Lab
Lab Overview & Needed Software (5:54)
Initial Preparation (9:12)
Installing Kali Linux as a VM on Windows (9:16)
Installing Kali Linux as a VM on Apple Mac OS (9:24)
Installing Kali Linux as a VM on Linux (10:41)
Kali Linux Overview (5:22)
The Linux Terminal & Basic Commands (13:06)
Section 2. Network Basics
Network Basics (4:28)
Connecting a Wireless Adapter To Kali (6:51)
MAC Address - What Is It & How To Change It (8:20)
Wireless Modes (Managed & Monitor mode) (6:57)
Section 3. Pre-Connection Attacks
Packet Sniffing Basics Using Airodump-ng (6:40)
WiFi Bands - 2.4Ghz & 5Ghz Frequencies (7:54)
Targeted Packet Sniffing Using Airodump-ng (10:30)
Deauthentication Attack (Disconnecting Any Device From The Network) (6:50)
Section 4. Gaining Access
Gaining Access Introduction (1:09)
Section 5. Gaining Access - WEP Cracking
Theory Behind Cracking WEP Encryption (5:47)
Basic Case (6:17)
Associating With Target Network Using Fake Authentication Attack (6:45)
Packet Injection - ARP Request Reply Attack (6:09)
Packet Injection - Korek Chopchop Attack (7:42)
Packet Injection - Fragmentation Attack (7:44)
Section 6. Gaining Access - WPA/WPA2 Cracking
Introduction to WPA WPA2 Cracking (3:42)
Exploiting the WPS Feature (8:17)
How to Capture a Handshake (6:49)
Creating a Wordlist Dictionary (7:33)
Cracking the Key Using a Wordlist Attack (6:26)
Cracking the Key Quicker using a Rainbow Table (7:00)
Cracking WPAWPA2 Much Faster Using GPU - Part 1 (7:19)
Cracking WPAWPA2 Much Faster Using GPU - Part 2 (10:38)
Section 7. Gaining Access - Security & Mitigation
Securing Your Network From The Above Attacks
How to Configure Wireless Security Settings To Secure Your Network (8:05)
Section 8. Post Connection Attacks
Post Connection Attacks Introduction (2:10)
Installing Windows As a Virtual machine (5:44)
Installing Windows as a Virtual Machine on Apple Silicon Computers (4:53)
Section 9. Post Connection Attacks - Information Gathering
Discovering Connected Clients using netdiscover (8:39)
Gathering More Information Using Zenmap (6:45)
Gathering Even More Information Using Zenmap (8:08)
Section 10. Post Connections Attacks - Man In The Middle Attacks (MITM)
ARP Poisoning Theory (9:04)
ARP Poisoning Using arpspoof (6:30)
Bettercap Basics (8:39)
ARP Poisoning Using Bettercap (8:17)
Spying on Network Devices (Capturing Passwords, Visited Websites...etc) (5:11)
Creating Custom Spoofing Script (9:54)
Bypassing HTTPS (11:12)
Bypassing HSTS (10:08)
DNS Spoofing - Redirecting Requests From One Website To Another (10:51)
Injecting Javascript Code (10:26)
Running all the Above Using a Graphical Interface (10:30)
Wireshark - Basic Overview & How To Use It With MITM Attacks (8:24)
Wireshark - Sniffing & Analysing Data (5:30)
Wireshark - Using Filters, Tracing & Dissecting Packets (6:28)
Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network (7:48)
Creating a Fake Access Point - Theory (7:29)
Creating a Fake AP Using Mana-Toolkit (9:31)
Section 11. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network
Backdoors and Payloads Basics (11:52)
Creating Your Own Backdoor (8:14)
Listening for Backdoor Connections (4:15)
Hacking Windows 11 Using Your Own Backdoor (6:27)
How to Bypass Anti-Virus Programs (6:02)
Meterpreter Basics - Interacting Wit Hacked Clients (5:35)
Meterpreter Basics - Interacting Wit Hacked Clients (5:35)
Section 12. ARP Poisonning Detection & Security
Detecting ARP Poisoning Attacks (5:05)
Detecting Suspicious Activities using Wireshark (5:41)
Audio Version of Training
Audio Download
How to Capture a Handshake
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock