Learn Network Hacking From Scratch (WiFi and Wired) [Video]
-
Free ChapterIntroduction & Course Outline
-
Preparation - Setting Up the Lab
-
Network Basics
-
Pre-Connection Attacks
-
Gaining Access
-
Gaining Access - WEP Cracking
-
Gaining Access - WPA/WPA2 Cracking
-
Gaining Access - Security & Mitigation
-
Post Connection Attacks
-
Post Connection Attacks - Information Gathering
-
Post Connections Attacks - Man in the Middle Attacks (MITM)
- ARP Poisoning Theory
- ARP Poisoning Using arpspoof
- ARP Poisoning Using MITMf & Capturing Passwords Entered By Users on the Network
- Bypassing HTTPS / SSL
- Stealing Cookies - Session Hijacking
- DNS Spoofing - Redirecting Requests From One Website to Another
- Capturing Screen of Target & Injecting a Keylogger
- Injecting Javascript/HTML Code
- Hooking Clients to Beef & Stealing Passwords
- MITM - Using MITMf against Real Networks
- Wireshark - Basic Overview & How to Use It with MITM Attacks
- Wireshark - Sniffing Data & Analysing HTTP Traffic
- Wireshark - Capturing Passwords & Cookies Entered By Any Device in the Network
-
Post Connection Attacks - Gaining Full Control over Devices on the Same Network
- Bonus - Installing Veil 3
- Bonus - Veil Overview & Payloads Basics
- Bonus - Generating an Undetectable Backdoor Using Veil 3
- Bonus - Listening For Incoming Connections
- Bonus - Using a Basic Delivery Method to Test the Backdoor & Hack Windows 10
- Creating a Fake Update & Hacking Any Client in the Network
- Meterpreter Basics - Interacting With Hacked Clients
-
ARP Poisoning Detection & Security
Welcome to this comprehensive course on network hacking! This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in the author's lab. The course is structured in a way that will take you through the basics of Linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks. This course will take you from total beginner to a more advanced level. All the attacks in this course are practical attacks that work against any wireless enabled device, so it does not matter if the device is a phone, tablet, laptop, or another device. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android, and so on.). Each attack is explained in a simple way first so that you understand how it actually works; first, you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.
Style and Approach
In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.
- Publication date:
- April 2018
- Publisher
- Packt
- Duration
- 5 hours 56 minutes
- ISBN
- 9781789340013