Course Description
Want to know the secrets to network hacking? Do you dream of becoming the ultimate script kiddie? If you want to become an ethical hacker, this advanced computer hacking course will teach you how to break into computer systems and networks to gain access to Wi-Fi passwords and much more.
This network hacking course will train you how to identify and exploit weaknesses in computer systems and networks, helping you to outsmart computer security and gain unauthorized access to a computer’s system. You’ll learn essential password cracking techniques and how to create Trojan horse viruses and other malicious codes. You’ll also familiarise with hacking operating systems and different types of attacks. Additionally, you’ll be trained on how to run attacks on HTTPS websites and write your own Python scripts to implement custom MITM attacks.
This advanced network hacking course is ideal for students who are already familiar with the basics of network hacking. Topics include captive portals, WEP cracking, WPA/WPA2 cracking, evil twin attacks and post-connection attacks,
What you’ll learn
- Learn how to write custom scripts to gather important hacking information
- Discover the secrets of how to unlock WPS on routers, even if they’re locked
- Understand how wireless phishing works and how to create fake captive portals
- Uncover the names of hidden networks and discover how to connect to them
- Learn how to replace downloaded files from a network with trojans
- Discover how to create trojans and combine any file in any format with an evil file
- Familiarise with common types of cybersecurity attacks and hacking techniques
- Understand how to exploit the WPS feature and hack Wi-Fi passwords
Requirements
- Computer with a minimum of 4GB ram/memory
- Operating System: Windows / OS X / Linux
- Finished the networks section of my general ethical hacking course OR
- Finished my network hacking course.
- For the wifi cracking ONLY – Wireless adapter that supports monitor mode (more info provided in the course).
Who this course is for:
- People who want to take their network hacking skills to the next level.
- People who want to have a better understanding of the subject and enhance their skills.
- People who want to be able to run attacks manually & write their own MITM scripts.
-
Teaser – Hacking a Windows 10 Computer & Accessing Their Webcam
00:07:00 -
Course Overview
00:05:00
-
Pre-connection Attacks Overview
00:02:00 -
Spoofing Mac Address Manually
00:03:00 -
Targeting 5 GHz Networks
00:07:00 -
Deauthenticating a Client From Protected WiFi Networks
00:07:00 -
Deauthenticating Multiple Clients From Protected WiFi Networks
00:08:00 -
Deauthenticating All Clients From Protected WiFi Network
00:06:00
-
Gaining Access Overview
00:02:00 -
Discovering Names of Hidden Networks
00:08:00 -
Connecting To Hidden Networks
00:05:00 -
Bypassing Mac Filtering (Blacklists & Whitelists)
00:09:00 -
Cracking SKA WEP Network
00:09:00 -
Securing Systems From The Above Attacks
00:03:00
-
Sniffing Captive Portal Login Information In Monitor Mode
00:10:00 -
Sniffing Captive Portal Login Information Using ARP Spoofing
00:09:00 -
Creating a Fake Captive Portal – Introduction
00:04:00 -
Creating Login Page – Cloning a Login Page
00:07:00 -
Creating Login Page – Fixing Relative Links
00:07:00 -
Creating Login Page – Adding Form Tag
00:08:00 -
Creating Login Page – Adding Submit Button
00:07:00 -
Preparing Computer To Run Fake Captive Portal
00:08:00 -
Starting The Fake Captive Portal
00:12:00 -
Redirecting Requests To Captive Portal Login Page
00:12:00 -
Generating Fake SSL Certificate
00:06:00 -
Enabling SSL/HTTPS On Webserver
00:08:00 -
Sniffing & Analysing Login Credentials
00:06:00
-
Exploiting WPS – Introduction
00:02:00 -
Bypassing “Failed to associate” Issue
00:08:00 -
Bypassing 0x3 and 0x4 Errors
00:08:00 -
WPS Lock – What Is It & How To Bypass It
00:07:00 -
Unlocking WPS
00:09:00
-
Advanced Wordlist Attacks – Introduction
00:02:00 -
Saving Aircrack-ng Cracking Progress
00:10:00 -
Using Huge Wordlists With Aircrack-ng Without Wasting Storage
00:08:00 -
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
00:10:00 -
Cracking WPA/WPA2 Much Faster Using GPU – Part 1
00:07:00 -
Cracking WPA/WPA2 Much Faster Using GPU – Part 2
00:11:00
-
What is It & How it Works
00:07:00 -
Installing Needed Software
00:08:00 -
Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing
00:10:00 -
Debugging & Fixing Login Interface
00:12:00
-
What is WPA/WPA2 Enterprise & How it Works
00:05:00 -
How To Hack WPA/WPA2 Enterprise
00:07:00 -
Stealing Login Credentials
00:08:00 -
Cracking Login Credentials
00:07:00 -
Securing Systems From The Above Gaining Access Attacks
00:05:00
-
Post Connection Attacks Overview
00:04:00 -
Ettercap – Basic Overview
00:07:00 -
Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
00:10:00 -
Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites
00:13:00 -
Automatically ARP Poisoning New Clients
00:07:00 -
DNS Spoofing Using Ettercap
00:06:00 -
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
00:09:00
-
MITMproxy – What is It & How To Install It
00:04:00 -
Using MITMproxy In Explicit Mode
00:07:00 -
Analysing (Filtering & Highlighting) Flows
00:05:00 -
Intercepting Network Flows
00:05:00 -
Modifying Responses & Injecting Javascript Manually
00:09:00 -
Intercepting & Modifying Responses In Transparent Mode
00:08:00 -
Editing Responses & Injecting BeEF’s Code On The Fly
00:09:00 -
Editing Responses Automatically Based On Regex
00:09:00 -
Stealing Login Info Using Fake Login Promo
00:07:00 -
[Bonus] – Hacking Windows 10 Using A Fake Update
00:05:00
-
What Do Mean By MITM Scripts?
00:06:00 -
Capturing & Printing Requests/Responses
00:09:00 -
Filtering Flows & Extracting Useful Data
00:09:00 -
Using Conditions To Execute Code On Useful Flows
00:10:00 -
Generating Custom HTTP Responses
00:09:00 -
Testing Script Locally
00:09:00 -
Generating Trojans – Installing The Trojan Factory
00:06:00 -
Generating Trojans – Converting Any File (eg: mage) To a Trojan
00:10:00 -
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
00:07:00 -
Executing Bash Commands & Calling Trojan Factory From Our Script
00:09:00 -
Using Variables & More Complex Conditions
00:09:00 -
Converting Downloads To Trojans On The Fly
00:10:00 -
Configuring The Trojan Factory’s MITMproxy Script
00:08:00 -
Using The Trojan Factory MITMproxy Script
00:08:00
-
Bypassing HTTPS With MITMproxy
00:06:00 -
Replacing Downloads From HTTPS
00:05:00 -
Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites
00:06:00 -
Securing Systems From The Above Post Connection Attacks
00:06:00
Course Reviews
No Reviews found for this course.