Curriculum
- Introduction
- Preparation - Setting Up The Lab
- Network Basics
- Pre-Connection Attacks
- Gaining Access
- Gaining Access - WEP Cracking
- Gaining Access - WPA/WPA2 Cracking
- Introduction to WPA / WPA2 Cracking
- Exploiting WPS Feature
- How To Capture The Handshake
- Creating a Wordlist / Dictionary
- Cracking the Key Using a Wordlist Attack
- Cracking the Key Quicker using a Rainbow Table
- Cracking WPA/WPA2 Much Faster Using GPU – Part 1
- Cracking WPA/WPA2 Much Faster Using GPU – Part 2
- Gaining Access - Security & Mitigation
- Post Connection Attacks
- Post Connection Attacks - Information Gathering
- Post Connections Attacks - Man In The Middle Attacks (MITM)
- ARP Poisoning Theory
- ARP Poisoning using arpspoof
- Bettercap Basics
- ARP Poisoning Using Bettercap
- Spying on Network Devices (Capturing Passwords, Visited Websites…etc)
- Creating Custom Spoofing Script
- Understanding HTTPS & How to Bypass it
- Bypassing HTTPS
- Bypassing HSTS
- DNS Spoofing – Redirecting Requests From One Website To Another
- Injecting Javascript Code
- Wireshark – Basic Overview & How To Use It With MITM Attacks
- Wireshark – Sniffing Data & Analysing Data
- Wireshark – Using Filters, Tracing & Dissecting Packets
- Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network
- Creating a Fake Access Point – Theory
- Creating a Fake AP Using Mana-Toolkit
- Post Connection Attacks - Gaining Full Control Over Devices On The Same Network
- Bonus – Installing Veil 3.1
- Bonus – Veil Overview & Payloads Basics
- Bonus – Generating An Undetectable Backdoor Using Veil 3
- Bonus – Listening For Incoming Connections
- Bonus – Using A Basic Delivery Method To Test The Backdoor and Hack Windows 10
- Creating a Fake Update & Hacking Any Client in the Network
- Meterpreter Basics – Interacting With Hacked Clients
- ARP Poisonning Detection & Security
- Bonus Section