Network Hacking Continued - Intermediate to Advanced [Video]

Preview in Mapt

Network Hacking Continued - Intermediate to Advanced [Video]

Zaid Sabih
New Release!

Learn advanced techniques to hack into WiFi and wired networks
Mapt Subscription
FREE
$29.99/m after trial
Video
$159.80
RRP $187.99
Save 14%
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$159.80
$29.99 p/m after trial
RRP $187.99
Subscription
Video
Start 14 Day Trial

Frequently bought together


Network Hacking Continued - Intermediate to Advanced [Video] Book Cover
Network Hacking Continued - Intermediate to Advanced [Video]
$ 187.99
$ 159.80
Selenium WebDriver With Java - Novice To Ninja plus Interview [Video] Book Cover
Selenium WebDriver With Java - Novice To Ninja plus Interview [Video]
$ 201.99
$ 171.70
Buy 2 for $35.01
Save $354.97
Add to Cart

Video Details

ISBN 139781789341478
Course Length9 hours and 59 minutes

Video Description

Welcome to this advanced network hacking course, designed to build up on what you already know about network hacking. It's recommended that you complete the network hacking section of the author's general ethical hacking course or finish his network hacking course before starting this course. Just like all of his other courses, this course is highly practical, whilst including the theory, but, since this is an advanced courseeach attack will be broken into its smaller components in order to understand how each of these components work; by the end of the course you will be able to mix these attacks and adopt attacks to suit different situations and different scenarios, and write your own man-in-the-middle scripts to implement your own man-in-the-middle attacks. Because this course builds on what you learn in the courses mentioned above, the main sections here have similar titles but the topics covered here are more advanced. Finally, at the end of the course, you will learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical attacks that work against real computers. In each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real-life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adapt them to different scenarios and different operating systems.

Style and Approach

This advanced network hacking course is designed to build upon what you already know about network hacking.

Table of Contents

Introduction
Teaser - Converting Downloads To Trojans on the Fly & Hacking Windows 10
Course Overview
Back to Basics/Pre-Connection Attacks
Pre-connection Attacks Overview
Spoofing Mac Address Manually
Targeting 5 GHz Networks
Deauthenticating a Client from Protected Wi-Fi Networks
Deauthenticating Multiple Clients from Protected WiFi Networks
Deauthenticating All Clients from Protected WiFi Network
Gaining Access
Gaining Access Overview
Discovering Names of Hidden Networks
Connecting To Hidden Networks
Bypassing Mac Filtering (Blacklists & Whitelists)
Cracking SKA WEP Networks
Securing Systems from the Above Attacks
Gaining Access - Captive Portals
Sniffing Captive Portal Login Information in Monitor Mode
Sniffing Captive Portal Login Information Using ARP Spoofing
Creating a Fake Captive Portal – Introduction
Creating Login Page - Cloning a Login Page
Creating Login Page - Fixing Relative Links
Creating Login Page - Adding Form Tag
Creating Login Page - Adding Submit Button
Preparing Computer to Run Fake Captive Portal
Starting the Fake Captive Portal
Redirecting Requests to Captive Portal Login Page
Generating Fake SSL Certificate
Enabling SSL/HTTPS On Webserver
Sniffing & Analyzing Login Credentials
Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
Exploiting WPS – Introduction
Bypassing "Failed to associate" Issue
Bypassing 0x3 and 0x4 Errors
WPS Lock - What Is It & How To Bypass It
Unlocking WPS
Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
Advanced Wordlist Attacks - Introduction
Saving Aircrack-ng Cracking Progress
Using Huge Wordlists With Aircrack-ng Without Wasting Storage
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
Cracking WPA/WPA2 Much Faster Using GPU - Part 1
Cracking WPA/WPA2 Much Faster Using GPU - Part 2
Gaining Access - WPA/WPA Cracking - Evil Twin Attack
What is It & How it Works
Installing Needed Software
Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing
Debugging & Fixing Login Interface
Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
What is WPA/WPA2 Enterprise & How it Works
How To Hack WPA/WPA2 Enterprise
Stealing Login Credentials
Cracking Login Credentials
Securing Systems From The Above Gaining Access Attacks
Post Connection Attacks
Post Connection Attacks Overview
Ettercap - Basic Overview
Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
Setting up SSLstrip Manually to Bypass HTTPS & Sniff Data from HTTPS Websites
Automatically ARP Poisoning New Clients
DNS Spoofing Using Ettercap
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
MITMproxy - What is It & How To Install It
Using MITMproxy In Explicit Mode
Analysing (Filtering & Highlighting) Flows
Intercepting Network Flows
Modifying Responses & Injecting Javascript Manually
Intercepting & Modifying Responses In Transparent Mode
Editing Responses & Injecting BeEF's Code On The Fly
Editing Responses Automatically Based On Regex
[Bonus] - Stealing Login Info Using Fake Login Prompt
[Bonus] - Hacking Windows 10 Using A Fake Update
Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
What Do You Mean By MITM Scripts?
Capturing & Printing Requests/Responses
Filtering Flows & Extracting Useful Data
Using Conditions To Execute Code On Useful Flows
Generating Custom HTTP Responses
Testing Script Locally
Generating Trojans - Installing The Trojan Factory
Generating Trojans - Converting Any File (eg:image) To a Trojan
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
Executing Bash Commands & Calling Trojan Factory From Our Script
Using Variables & More Complex Conditions
Converting Downloads To Trojans On The Fly
Configuring The Trojan Factory's MITMproxy Script
Using The Trojan Factory MITMproxy Script
Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
Bypassing HTTPS with MITMproxy
Replacing Downloads From HTTPS
Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites
Securing Systems From The Above Post Connection Attacks

What You Will Learn

  • This course includes 50 detailed videos on practical attacks against Wi-Fi networks including a number of advanced practical attacks. 
  • Learn how to disconnect multiple/all clients from their networks without knowing the keyBypass MAC filtering (both black and white lists). 
  • Discover the names of hidden networks and connect to them. 
  • Crack more secure WEP implementation when SKA is used.
  • Exploit WPS on more secure routers to get the WPA/WPA2 key.Unlock WPS on some routers even if its locked. Understand how WPA/WPA2 enterprise works.
  • Gain access to networks that use WPA/WPA2 enterprise using two methods.
  • Gain access to captive portals (hotels and airport networks) using three methods.
  • Understand how a fake access point works and be able to create one manually from scratch.
  • Generate SSL certificates & use it to support HTTPS on Apache2, and much more.

Authors

Table of Contents

Introduction
Teaser - Converting Downloads To Trojans on the Fly & Hacking Windows 10
Course Overview
Back to Basics/Pre-Connection Attacks
Pre-connection Attacks Overview
Spoofing Mac Address Manually
Targeting 5 GHz Networks
Deauthenticating a Client from Protected Wi-Fi Networks
Deauthenticating Multiple Clients from Protected WiFi Networks
Deauthenticating All Clients from Protected WiFi Network
Gaining Access
Gaining Access Overview
Discovering Names of Hidden Networks
Connecting To Hidden Networks
Bypassing Mac Filtering (Blacklists & Whitelists)
Cracking SKA WEP Networks
Securing Systems from the Above Attacks
Gaining Access - Captive Portals
Sniffing Captive Portal Login Information in Monitor Mode
Sniffing Captive Portal Login Information Using ARP Spoofing
Creating a Fake Captive Portal – Introduction
Creating Login Page - Cloning a Login Page
Creating Login Page - Fixing Relative Links
Creating Login Page - Adding Form Tag
Creating Login Page - Adding Submit Button
Preparing Computer to Run Fake Captive Portal
Starting the Fake Captive Portal
Redirecting Requests to Captive Portal Login Page
Generating Fake SSL Certificate
Enabling SSL/HTTPS On Webserver
Sniffing & Analyzing Login Credentials
Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
Exploiting WPS – Introduction
Bypassing "Failed to associate" Issue
Bypassing 0x3 and 0x4 Errors
WPS Lock - What Is It & How To Bypass It
Unlocking WPS
Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
Advanced Wordlist Attacks - Introduction
Saving Aircrack-ng Cracking Progress
Using Huge Wordlists With Aircrack-ng Without Wasting Storage
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
Cracking WPA/WPA2 Much Faster Using GPU - Part 1
Cracking WPA/WPA2 Much Faster Using GPU - Part 2
Gaining Access - WPA/WPA Cracking - Evil Twin Attack
What is It & How it Works
Installing Needed Software
Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing
Debugging & Fixing Login Interface
Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
What is WPA/WPA2 Enterprise & How it Works
How To Hack WPA/WPA2 Enterprise
Stealing Login Credentials
Cracking Login Credentials
Securing Systems From The Above Gaining Access Attacks
Post Connection Attacks
Post Connection Attacks Overview
Ettercap - Basic Overview
Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
Setting up SSLstrip Manually to Bypass HTTPS & Sniff Data from HTTPS Websites
Automatically ARP Poisoning New Clients
DNS Spoofing Using Ettercap
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
MITMproxy - What is It & How To Install It
Using MITMproxy In Explicit Mode
Analysing (Filtering & Highlighting) Flows
Intercepting Network Flows
Modifying Responses & Injecting Javascript Manually
Intercepting & Modifying Responses In Transparent Mode
Editing Responses & Injecting BeEF's Code On The Fly
Editing Responses Automatically Based On Regex
[Bonus] - Stealing Login Info Using Fake Login Prompt
[Bonus] - Hacking Windows 10 Using A Fake Update
Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
What Do You Mean By MITM Scripts?
Capturing & Printing Requests/Responses
Filtering Flows & Extracting Useful Data
Using Conditions To Execute Code On Useful Flows
Generating Custom HTTP Responses
Testing Script Locally
Generating Trojans - Installing The Trojan Factory
Generating Trojans - Converting Any File (eg:image) To a Trojan
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
Executing Bash Commands & Calling Trojan Factory From Our Script
Using Variables & More Complex Conditions
Converting Downloads To Trojans On The Fly
Configuring The Trojan Factory's MITMproxy Script
Using The Trojan Factory MITMproxy Script
Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
Bypassing HTTPS with MITMproxy
Replacing Downloads From HTTPS
Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites
Securing Systems From The Above Post Connection Attacks

Video Details

ISBN 139781789341478
Course Length9 hours and 59 minutes
Read More

Read More Reviews

Recommended for You

Selenium WebDriver With Java - Novice To Ninja plus Interview [Video] Book Cover
Selenium WebDriver With Java - Novice To Ninja plus Interview [Video]
$ 201.99
$ 171.70
Introduction to Apache NiFi (Hortonworks DataFlow - HDF 2.0) [Video] Book Cover
Introduction to Apache NiFi (Hortonworks DataFlow - HDF 2.0) [Video]
$ 28.99
$ 24.65
Network Security [Video] Book Cover
Network Security [Video]
$ 124.99
$ 106.25
The Complete JavaScript Developer: A Primer to Full Stack JS [Video] Book Cover
The Complete JavaScript Developer: A Primer to Full Stack JS [Video]
$ 71.99
$ 61.20
Apache Kafka Series - Learn Apache Kafka for Beginners [Video] Book Cover
Apache Kafka Series - Learn Apache Kafka for Beginners [Video]
$ 47.99
$ 40.80
Learn Network Hacking From Scratch (WiFi and Wired) [Video] Book Cover
Learn Network Hacking From Scratch (WiFi and Wired) [Video]
$ 98.99
$ 84.15