Network Hacking Continued - Intermediate to Advanced [Video]
-
Free ChapterIntroduction
-
Back to Basics/Pre-Connection Attacks
-
Gaining Access
-
Gaining Access - Captive Portals
- Sniffing Captive Portal Login Information in Monitor Mode
- Sniffing Captive Portal Login Information Using ARP Spoofing
- Creating a Fake Captive Portal – Introduction
- Creating Login Page - Cloning a Login Page
- Creating Login Page - Fixing Relative Links
- Creating Login Page - Adding Form Tag
- Creating Login Page - Adding Submit Button
- Preparing Computer to Run Fake Captive Portal
- Starting the Fake Captive Portal
- Redirecting Requests to Captive Portal Login Page
- Generating Fake SSL Certificate
- Enabling SSL/HTTPS On Webserver
- Sniffing & Analyzing Login Credentials
-
Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
-
Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
- Advanced Wordlist Attacks - Introduction
- Saving Aircrack-ng Cracking Progress
- Using Huge Wordlists With Aircrack-ng Without Wasting Storage
- Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
- Cracking WPA/WPA2 Much Faster Using GPU - Part 1
- Cracking WPA/WPA2 Much Faster Using GPU - Part 2
-
Gaining Access - WPA/WPA Cracking - Evil Twin Attack
-
Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
-
Post Connection Attacks
- Post Connection Attacks Overview
- Ettercap - Basic Overview
- Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
- Setting up SSLstrip Manually to Bypass HTTPS & Sniff Data from HTTPS Websites
- Automatically ARP Poisoning New Clients
- DNS Spoofing Using Ettercap
- Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
-
Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
- MITMproxy - What is It & How To Install It
- Using MITMproxy In Explicit Mode
- Analysing (Filtering & Highlighting) Flows
- Intercepting Network Flows
- Modifying Responses & Injecting Javascript Manually
- Intercepting & Modifying Responses In Transparent Mode
- Editing Responses & Injecting BeEF's Code On The Fly
- Editing Responses Automatically Based On Regex
- [Bonus] - Stealing Login Info Using Fake Login Prompt
- [Bonus] - Hacking Windows 10 Using A Fake Update
-
Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
- What Do You Mean By MITM Scripts?
- Capturing & Printing Requests/Responses
- Filtering Flows & Extracting Useful Data
- Using Conditions To Execute Code On Useful Flows
- Generating Custom HTTP Responses
- Testing Script Locally
- Generating Trojans - Installing The Trojan Factory
- Generating Trojans - Converting Any File (eg:image) To a Trojan
- Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
- Executing Bash Commands & Calling Trojan Factory From Our Script
- Using Variables & More Complex Conditions
- Converting Downloads To Trojans On The Fly
- Configuring The Trojan Factory's MITMproxy Script
- Using The Trojan Factory MITMproxy Script
-
Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
Welcome to this advanced network hacking course, designed to build up on what you already know about network hacking. It's recommended that you complete the network hacking section of the author's general ethical hacking course or finish his network hacking course before starting this course. Just like all of his other courses, this course is highly practical, whilst including the theory, but, since this is an advanced courseeach attack will be broken into its smaller components in order to understand how each of these components work; by the end of the course you will be able to mix these attacks and adopt attacks to suit different situations and different scenarios, and write your own man-in-the-middle scripts to implement your own man-in-the-middle attacks. Because this course builds on what you learn in the courses mentioned above, the main sections here have similar titles but the topics covered here are more advanced. Finally, at the end of the course, you will learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical attacks that work against real computers. In each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real-life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adapt them to different scenarios and different operating systems.
Style and Approach
This advanced network hacking course is designed to build upon what you already know about network hacking.
- Publication date:
- April 2018
- Publisher
- Packt
- Duration
- 9 hours 59 minutes
- ISBN
- 9781789341478