Course is divided into III Categories:
- Pre- Connection Attacks:
- Extend the attacks of pre-connections.
- Run all the attacks of Networks and Clients that you already know about using 5 Ghz.
- For targeting multiple clients and networks at same time, learn to extend the deauthentication attack.
- Without being dependent on other tool learn to manually change your MAC Address on any other device.
- Gaining Access:
- For gaining any Network Configurations and Encryptions access, learn a number of advanced techniques.
- Due to some security features which would prevent you from trying any attacks learn to fix all of them.
- Discover and target networks that are hidden.
- Learn to bypass the MAC Filtering even if that is implemented using a black-list/white-list.
- Understand to manually create and configure fake access point. Therefore you will find how that works and on what service it relies upon.
- By the end of this section, you will understand exactly how fake access points to suit all your needs are created.
- Learn to create the fake captive portals.
- Learn to steal the WPA and WPA 2 Passwords and spy on the clients who are connecting to it.
- Captive Portals- These are the open networks where users are supposed to login after connecting to it. These are usually used in the Airport or Hotels. And in this there are 3 Sub-Sections:
- WEP Cracking: Open authentication when used then WEP is used, even though this is an old encryption but you must know how to make use of it, where OPEN Authentication is used. Learn to gain the access to WEP Networks, which are using SKA i.e. Shared Key Authentication.
- WPA/WPA2 Cracking: Learn more of the advanced techniques of the WPA/WPA2 Networks
- Post-Connection Attacks:
Target en-rollers for this course:
- Techies and IT Professionals seeking forward to learn network penetration testing
- Folks who are keen to discover ways of protecting networks from hackers
Some exceptional benefits associated with this course enrolment are:
- Quality course material
- Lifetime access to the course
- Instant & free course updates
- Access to all Questions & Answers initiated by other students as well
- Personalized support from the instructor’s end on any issue related to the course
- Few free lectures for a quick overview
- Certificate of completion
It’s time for you to grab the opportunity and make the most out of this course.
2. Back To Basics/Pre-Connection Attacks
3. Gaining Access
4. Gaining access captive portals
- Sniffing Captive Portal Logins Information In Monitor Mode
- Sniffing Captive Portal Logins Information using ARP Spoofing
- Creating a Fake Captive Portal- Introduction
- Creating a Login Page- Cloning a Login Page
- Creating a Login Page- Fixing Relative Links
- Creating A Login Page- Adding Form Tag
- Creating A Login Page- Adding Submit Buttton
- Preparing Computer To Run Fake Captive Portal
- Starting the Fake Captive Portal
- Redirecting Requests To Captive Portal Login Page
- Generating Fake SSL Certificate
- Enabling SSL/HTTPS On Webserver
- Sniffing & Analysing Login Credentials
5. Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
6. Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
- Advanced Wordlist Attacks – Introduction
- Saving Aircrack-ng Cracking Progress
- Using Huge Wordlists With Aircrack-ng Without Wasting Storage
- Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
- Cracking WPA/WPA2 Much Faster Using GPU – Part 1
- Cracking WPA/WPA2 Much Faster Using GPU – Part 2
7. Gaining Access - WPA/WPA Cracking - Evil Twin Attack
8. Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
9. Post Connection Attacks
- Post Connection Attacks Overview
- Ettercap- Basic Overview
- Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
- Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites
- Automatically ARP Poisoning New Clients
- DNS Spoofing Using Ettercap
- Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
- MITMproxy – What is It & How To Install It
- Using MITMproxy In Explicit Mode
- Analysing (Filtering & Highlighting) Flows
- Intercepting Network Flows
- Intercepting & Modifying Responses In Transparent Mode
- Editing Responses & Injecting BeEF’s Code On The Fly
- Editing Responses Automatically Based On Regex
- [Bonus] – Stealing Login Info Using Fake Login Prompt
- [Bonus] – Hacking Windows 10 Using A Fake Update
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
- What Do Mean By MITM Scripts?
- Capturing & Printing Requests/Responses
- Filtering Flows & Extracting Useful Data
- Using Conditions To Execute Code On Useful Flows
- Generating Custom HTTP Responses
- Testing Script Locally
- Generating Trojan- Installing The Trojan Family
- Generating Trojan- Converting Any File (eg:image) To a Trojan
- Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
- Executing Bash Commands & Calling Trojan Factory From Our Script
- Using Variables & More Complex Conditions
- Converting Downloads To Trojans On The Fly
- Configuring The Trojan Factory’s MITMproxy Script
- Using The Trojan Factory MITMproxy Script
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites