Post Connection Attacks Overview

Post-Connection.pdf

49. Post Connection Attacks Overview

OK, now that you know how to gain access to networks, even if they use encryption and even if they

implement a large number of security features in the section, we're going to talk about the post connection

attacks.

So the attacks that you can do after you connect to a network.

Now, all of the attacks that we're going to talk about here will work against wi fi and Ethernet or

wire networks.

You just need to make sure that you're actually connected to that network.

So throughout the section, I'm going to be running some of the attacks against a wireless network after

connecting to it, or I'm going to be running it against the virtual not network, which acts exactly

as an Internet network, just to prove to you that this will work against both Wi-Fi and wired networks.

So in the first subsection of this section, we're going to visit some basics and I'm going to show

you how to manually run an ERP spoofing attack, become the man in the middle, sniff data, bypass

https, do DNS spoofing, add more cool stuff that you might already know how to do using scripts such

as Man in the Middle.

Now the word manually is highlighted here because I want you to know how to do this independent of scripts

that will do everything for you, because once you know how to do stuff manually if scripts fail,

then you'll be able to fix it or know where it's going wrong and fix that.

And you'll also be able to kind of take out each of these components and plug it into your own network

and then and then run your more powerful attack.

I will also show you how to bypass some security features if they're implemented on the other side and

still be able to run your IRP spoofing without triggering any alarm.

No, this is all going to be the first subsection of this section.

In the next subsection.

I'm going to show you how to analyze data flows and start building up your own attacks.

So if you have an idea of an attack and there is no tool that does that attack for you, I'm going to

show you how to, first of all, analyze, see what happens when someone does something or how do you

want this attack to be triggered.

And then I'm going to show you how to run this attack and get it to work.

So we're going to be, first of all, showing you some attacks that in the middle have already implements,

such as injecting JavaScript or modifying HTML code, which you're going to be doing that manually.

You're going to be creating that attack manually.

So you want to be dependent on tools such as Man in the Middle.

And then and the last subsection of this section is where everything clicks together.

So I'm actually going to show you how to write your own scripts to run your own attacks.

So we're going to be doing attacks that there are no tools around that do it.

We're going to show you how to, first of all, think of an attack and then I'm going to show you how

to write a script that will execute this attack for you.

So you won't have to do it manually every time you want to run it.

I'm going to be talking about each component and each part of creating your own attack separately,

so we're going to be talking about analyzing data flows and analyzing what happens when someone does

something on the network.

We're going to talk about how to come up with an attack and then we're going to talk about how to test

it and implement that attack.

So by the end of the section, you're going to be able to implement any attacks that you think of,

even if there is no tools that do it for you.

You're going to be able to sit down, analyze and write and build up your own attack.

So this is crucial because in a lot of scenarios, you might have an idea and this idea will actually

work, but you might not have the skills to put it to make it work practically.

So by the end of this course, you'll be able to do such things.

And I'm actually as an example, we're going to be building a tool that's going to create a Trojan out

of any files that any person downloads and the same network.

So there is nothing around the Internet that does that.

And this just goes to show you how you can use the information here to build up any attack that you

can think of.



Complete and Continue  

Become a Member and Get Unlimited Access to 340+ Top Cyber Security Courses.