Introduction & Course Outline

Lecture Transcript - Introduction & Course Outline

Hello and welcome.

My name is Zaid I am an ethical hacker, a computer scientist, and I'll be your instructor for this course.

And this course you'll learn network penetration testing from scratch.

So you'll learn both wired and wireless network penetration testing.

And by the end of it, you'll be at a high intermediate level being able to launch attacks exactly like

Blackheart hackers would do.

Not only that, but you'll also be able to secure your networks from these attacks.

The first thing we're going to learn is how to set up your lab so that you can practice penetration

testing safely in your own environment, once done with that, we're going to move in and learn how

networks work, how devices connect to our network and how they interact with each other.

Once we understand how these things work, will moving into our three main penetration testing sections.

The first section is free connection attacks.

So in this section, you'll learn all the attacks that you can do before you connect to the network.

So it's going to be mostly geared towards wireless networks at the start, because if you want to connect

to our network, you can literally just connect using the wire and then you'll be able to move to Section

three, where you can run more sophisticated attacks.

So the first section, you'll learn how to control all the connections around you so you can disconnect

any device from any network without having to connect to that network.

You'll also learn how to set up a fake access point and lure people into connecting to it, and then

you'll be able to capture all the data sent or received by any of the people connected to your fake

wireless network.

So they'll be able to see the usernames and passwords, anything that they do, really.

What's wrong with that, we're going to move into the second section, which is gaining access.

So, again, if your target is a wired network, you can use the wire, connect to it some network use

filtering.

So we'll see how you can bypass the filtering by changing the Mac address if the target is a wireless

network.

The process is much more complicated.

Most wireless networks these days, they use encryption and they use passwords.

So you learn a number of attacks to get your passwords for any network, whether it uses Web, WPA or

WPA to encryption.

What's done with that?

And we have access to our target network.

We're going to move in to Section three, the post connection attacks.

This section is going to be the most fun.

And you're going to learn attacks that you can run against both wired and wireless networks.

And it's going to work against any type of device, whether it's a laptop running Windows, Linux,

Mac OS or a TV, a phone and Android phone.

And I always found any computer or any device that is connected to a network.

These attacks will work against these attacks, will allow you to capture anything sent or received

by any of the devices in your network.

So they'll be able to capture usernames, passwords, cookies, websites, visits, you'll be able to

get screenshots of any device in your network, you'll be able to inject key loggers and at the end

of it, you'll even be able to gain full control over any device that is in your network.

Once we're done with all of these sections, I'm going to teach you how to detect and secure your networks

from the attacks, explained.

Now, the course is highly practical, but it doesn't neglect the theory part, so you're going to learn

how each of these attacks work.

Why do these attack work?

And then we're going to launch the attack against real devices in my environment.

So these are proof of concept or anything theory.

These are practical attacks that work against all devices.


Complete and Continue  

Become a Member and Get Unlimited Access to 300+ Top Cyber Security Courses.