Learn Network Hacking Continued Intermediate To Advanced
Course is divided into III Categories:
- Pre- Connection Attacks:
- Extend the attacks of pre-connections.
- Run all the attacks of Networks and Clients that you already know about using 5 Ghz.
- For targeting multiple clients and networks at same time, learn to extend the deauthentication attack.
- Without being dependent on other tool learn to manually change your MAC Address on any other device.
- Gaining Access:
- For gaining any Network Configurations and Encryptions access, learn a number of advanced techniques.
- Due to some security features which would prevent you from trying any attacks learn to fix all of them.
- Discover and target networks that are hidden.
- Learn to bypass the MAC Filtering even if that is implemented using a black-list/white-list.
- Understand to manually create and configure fake access point. Therefore you will find how that works and on what service it relies upon.
- By the end of this section, you will understand exactly how fake access points to suit all your needs are created.
- Learn to create the fake captive portals.
- Learn to steal the WPA and WPA 2 Passwords and spy on the clients who are connecting to it.
- Captive Portals- These are the open networks where users are supposed to login after connecting to it. These are usually used in the Airport or Hotels. And in this there are 3 Sub-Sections:
- WEP Cracking: Open authentication when used then WEP is used, even though this is an old encryption but you must know how to make use of it, where OPEN Authentication is used. Learn to gain the access to WEP Networks, which are using SKA i.e. Shared Key Authentication.
- WPA/WPA2 Cracking: Learn more of the advanced techniques of the WPA/WPA2 Networks
- Post-Connection Attacks:
Target en-rollers for this course:
- Techies and IT Professionals seeking forward to learn network penetration testing
- Folks who are keen to discover ways of protecting networks from hackers
Some exceptional benefits associated with this course enrolment are:
- Quality course material
- Lifetime access to the course
- Instant & free course updates
- Access to all Questions & Answers initiated by other students as well
- Personalized support from the instructor’s end on any issue related to the course
- Few free lectures for a quick overview
- Certificate of completion
It’s time for you to grab the opportunity and make the most out of this course.
Enroll today!!
Curriculum
- 12 Sections
- 81 Lessons
- 52 Weeks
- 1. Introduction1
- 2. Back To Basics/Pre-Connection Attacks6
- 2.1Pre-connection Attacks Overview1 Minute
- 2.2Spoofing Mac Address Manually3 Minutes
- 2.3Targeting 5 GHz Networks6 Minutes
- 2.4Deauthenticating a Client From Protected WiFi Networks6 Minutes
- 2.5Deauthenticating Multiple Clients From Protected WiFi Networks7 Minutes
- 2.6Deauthenticating All Clients From Protected WiFi Network6 Minutes
- 3. Gaining Access6
- 4. Gaining access captive portals13
- 4.1Sniffing Captive Portal Logins Information In Monitor Mode9 Minutes
- 4.2Sniffing Captive Portal Logins Information using ARP Spoofing8 Minutes
- 4.3Creating a Fake Captive Portal- Introduction4 Minutes
- 4.4Creating a Login Page- Cloning a Login Page7 Minutes
- 4.5Creating a Login Page- Fixing Relative Links7 Minutes
- 4.6Creating A Login Page- Adding Form Tag6 Minutes
- 4.7Creating A Login Page- Adding Submit Buttton7 Minutes
- 4.8Preparing Computer To Run Fake Captive Portal6 Minutes
- 4.9Starting the Fake Captive Portal11 Minutes
- 4.10Redirecting Requests To Captive Portal Login Page12 Minutes
- 4.11Generating Fake SSL Certificate5 Minutes
- 4.12Enabling SSL/HTTPS On Webserver7 Minutes
- 4.13Sniffing & Analysing Login Credentials6 Minutes
- 5. Gaining Access - WPA/WPA2 Cracking - Exploiting WPS5
- 6. Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack6
- 6.1Advanced Wordlist Attacks – Introduction1 Minute
- 6.2Saving Aircrack-ng Cracking Progress9 Minutes
- 6.3Using Huge Wordlists With Aircrack-ng Without Wasting Storage7 Minutes
- 6.4Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage10 Minutes
- 6.5Cracking WPA/WPA2 Much Faster Using GPU – Part 17 Minutes
- 6.6Cracking WPA/WPA2 Much Faster Using GPU – Part 210 Minutes
- 7. Gaining Access - WPA/WPA Cracking - Evil Twin Attack4
- 8. Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise5
- 9. Post Connection Attacks7
- 9.1Post Connection Attacks Overview4 Minutes
- 9.2Ettercap- Basic Overview7 Minutes
- 9.3Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords9 Minutes
- 9.4Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites12 Minutes
- 9.5Automatically ARP Poisoning New Clients6 Minutes
- 9.6DNS Spoofing Using Ettercap5 Minutes
- 9.7Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms9 Minutes
- 10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks10
- 10.1MITMproxy – What is It & How To Install It3 Minutes
- 10.2Using MITMproxy In Explicit Mode7 Minutes
- 10.3Analysing (Filtering & Highlighting) Flows5 Minutes
- 10.4Intercepting Network Flows4 Minutes
- 10.5Modifying Responses & Injecting Javascript Manually8 Minutes
- 10.6Intercepting & Modifying Responses In Transparent Mode7 Minutes
- 10.7Editing Responses & Injecting BeEF’s Code On The Fly9 Minutes
- 10.8Editing Responses Automatically Based On Regex9 Minutes
- 10.9[Bonus] – Stealing Login Info Using Fake Login Prompt7 Minutes
- 10.10[Bonus] – Hacking Windows 10 Using A Fake Update4 Minutes
- 11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks14
- 11.1What Do Mean By MITM Scripts?6 Minutes
- 11.2Capturing & Printing Requests/Responses8 Minutes
- 11.3Filtering Flows & Extracting Useful Data9 Minutes
- 11.4Using Conditions To Execute Code On Useful Flows9 Minutes
- 11.5Generating Custom HTTP Responses8 Minutes
- 11.6Testing Script Locally8 Minutes
- 11.7Generating Trojan- Installing The Trojan Family6 Minutes
- 11.8Generating Trojan- Converting Any File (eg:image) To a Trojan10 Minutes
- 11.9Testing Script On Remote Computer To Replace Downloads With a Generic Trojan7 Minutes
- 11.10Executing Bash Commands & Calling Trojan Factory From Our Script8 Minutes
- 11.11Using Variables & More Complex Conditions8 Minutes
- 11.12Converting Downloads To Trojans On The Fly10 Minutes
- 11.13Configuring The Trojan Factory’s MITMproxy Script7 Minutes
- 11.14Using The Trojan Factory MITMproxy Script7 Minutes
- 12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites4
Ethical Hacker, Pen-tester & Computer Scientist
I am an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. I studied PC Science in University College Dublin & graduated in 2016.
I have a superb revel in ethical hacking, I commenced making video tutorials back in 2009 in a moral hacking community (iSecuri1ty), and I additionally labored as a pen-tester for the identical enterprise. In 2013 I started out teaching my first direction on line in Arabic, this path acquired wonderful comments which prompted me to create an English version of this course.
The English course became the most famous and the top paid path, this prompted me to make more publications on moral hacking, now I have plenty of courses on ethical hacking and more than 200,000 students enrolled on exclusive teaching structures.
Courses you might be interested in
-
15 Lessons
-
10 Lessons
-
13 Lessons
-
39 Lessons