Course Description
Want to know the secrets to network hacking? Do you dream of becoming the ultimate script kiddie? If you want to become an ethical hacker, this advanced computer hacking course will teach you how to break into computer systems and networks to gain access to Wi-Fi passwords and much more.
This network hacking course will train you how to identify and exploit weaknesses in computer systems and networks, helping you to outsmart computer security and gain unauthorized access to a computer’s system. You’ll learn essential password cracking techniques and how to create Trojan horse viruses and other malicious codes. You’ll also familiarise with hacking operating systems and different types of attacks. Additionally, you’ll be trained on how to run attacks on HTTPS websites and write your own Python scripts to implement custom MITM attacks.
This advanced network hacking course is ideal for students who are already familiar with the basics of network hacking. Topics include captive portals, WEP cracking, WPA/WPA2 cracking, evil twin attacks and post-connection attacks,
What you’ll learn
- Learn how to write custom scripts to gather important hacking information
- Discover the secrets of how to unlock WPS on routers, even if they’re locked
- Understand how wireless phishing works and how to create fake captive portals
- Uncover the names of hidden networks and discover how to connect to them
- Learn how to replace downloaded files from a network with trojans
- Discover how to create trojans and combine any file in any format with an evil file
- Familiarise with common types of cybersecurity attacks and hacking techniques
- Understand how to exploit the WPS feature and hack Wi-Fi passwords
Requirements
- Computer with a minimum of 4GB ram/memory
- Operating System: Windows / OS X / Linux
- Finished the networks section of my general ethical hacking course OR
- Finished my network hacking course.
- For the wifi cracking ONLY – Wireless adapter that supports monitor mode (more info provided in the course).
Who this course is for:
- People who want to take their network hacking skills to the next level.
- People who want to have a better understanding of the subject and enhance their skills.
- People who want to be able to run attacks manually & write their own MITM scripts.
-
Teaser – Hacking a Windows 10 Computer & Accessing Their Webcam00:07:00
-
Course Overview00:05:00
-
Pre-connection Attacks Overview00:02:00
-
Spoofing Mac Address Manually00:03:00
-
Targeting 5 GHz Networks00:07:00
-
Deauthenticating a Client From Protected WiFi Networks00:07:00
-
Deauthenticating Multiple Clients From Protected WiFi Networks00:08:00
-
Deauthenticating All Clients From Protected WiFi Network00:06:00
-
Gaining Access Overview00:02:00
-
Discovering Names of Hidden Networks00:08:00
-
Connecting To Hidden Networks00:05:00
-
Bypassing Mac Filtering (Blacklists & Whitelists)00:09:00
-
Cracking SKA WEP Network00:09:00
-
Securing Systems From The Above Attacks00:03:00
-
Sniffing Captive Portal Login Information In Monitor Mode00:10:00
-
Sniffing Captive Portal Login Information Using ARP Spoofing00:09:00
-
Creating a Fake Captive Portal – Introduction00:04:00
-
Creating Login Page – Cloning a Login Page00:07:00
-
Creating Login Page – Fixing Relative Links00:07:00
-
Creating Login Page – Adding Form Tag00:08:00
-
Creating Login Page – Adding Submit Button00:07:00
-
Preparing Computer To Run Fake Captive Portal00:08:00
-
Starting The Fake Captive Portal00:12:00
-
Redirecting Requests To Captive Portal Login Page00:12:00
-
Generating Fake SSL Certificate00:06:00
-
Enabling SSL/HTTPS On Webserver00:08:00
-
Sniffing & Analysing Login Credentials00:06:00
-
Exploiting WPS – Introduction00:02:00
-
Bypassing “Failed to associate” Issue00:08:00
-
Bypassing 0x3 and 0x4 Errors00:08:00
-
WPS Lock – What Is It & How To Bypass It00:07:00
-
Unlocking WPS00:09:00
-
Advanced Wordlist Attacks – Introduction00:02:00
-
Saving Aircrack-ng Cracking Progress00:10:00
-
Using Huge Wordlists With Aircrack-ng Without Wasting Storage00:08:00
-
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage00:10:00
-
Cracking WPA/WPA2 Much Faster Using GPU – Part 100:07:00
-
Cracking WPA/WPA2 Much Faster Using GPU – Part 200:11:00
-
What is It & How it Works00:07:00
-
Installing Needed Software00:08:00
-
Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing00:10:00
-
Debugging & Fixing Login Interface00:12:00
-
What is WPA/WPA2 Enterprise & How it Works00:05:00
-
How To Hack WPA/WPA2 Enterprise00:07:00
-
Stealing Login Credentials00:08:00
-
Cracking Login Credentials00:07:00
-
Securing Systems From The Above Gaining Access Attacks00:05:00
-
Post Connection Attacks Overview00:04:00
-
Ettercap – Basic Overview00:07:00
-
Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords00:10:00
-
Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites00:13:00
-
Automatically ARP Poisoning New Clients00:07:00
-
DNS Spoofing Using Ettercap00:06:00
-
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms00:09:00
-
MITMproxy – What is It & How To Install It00:04:00
-
Using MITMproxy In Explicit Mode00:07:00
-
Analysing (Filtering & Highlighting) Flows00:05:00
-
Intercepting Network Flows00:05:00
-
Modifying Responses & Injecting Javascript Manually00:09:00
-
Intercepting & Modifying Responses In Transparent Mode00:08:00
-
Editing Responses & Injecting BeEF’s Code On The Fly00:09:00
-
Editing Responses Automatically Based On Regex00:09:00
-
Stealing Login Info Using Fake Login Promo00:07:00
-
[Bonus] – Hacking Windows 10 Using A Fake Update00:05:00
-
What Do Mean By MITM Scripts?00:06:00
-
Capturing & Printing Requests/Responses00:09:00
-
Filtering Flows & Extracting Useful Data00:09:00
-
Using Conditions To Execute Code On Useful Flows00:10:00
-
Generating Custom HTTP Responses00:09:00
-
Testing Script Locally00:09:00
-
Generating Trojans – Installing The Trojan Factory00:06:00
-
Generating Trojans – Converting Any File (eg: mage) To a Trojan00:10:00
-
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan00:07:00
-
Executing Bash Commands & Calling Trojan Factory From Our Script00:09:00
-
Using Variables & More Complex Conditions00:09:00
-
Converting Downloads To Trojans On The Fly00:10:00
-
Configuring The Trojan Factory’s MITMproxy Script00:08:00
-
Using The Trojan Factory MITMproxy Script00:08:00
-
Bypassing HTTPS With MITMproxy00:06:00
-
Replacing Downloads From HTTPS00:05:00
-
Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites00:06:00
-
Securing Systems From The Above Post Connection Attacks00:06:00
Course Reviews
No Reviews found for this course.