Curriculum
-
Introduction
-
Preparation - Setting Up The Lab
-
Network Basics
-
Pre-Connection Attacks
-
Gaining Access
-
Gaining Access - WEP Cracking
-
Gaining Access - WPA/WPA2 Cracking
- Introduction to WPA / WPA2 Cracking
- Exploiting WPS Feature
- How To Capture The Handshake
- Creating a Wordlist / Dictionary
- Cracking the Key Using a Wordlist Attack
- Cracking the Key Quicker using a Rainbow Table
- Cracking WPA/WPA2 Much Faster Using GPU – Part 1
- Cracking WPA/WPA2 Much Faster Using GPU – Part 2
-
Gaining Access - Security & Mitigation
-
Post Connection Attacks
-
Post Connection Attacks - Information Gathering
-
Post Connections Attacks - Man In The Middle Attacks (MITM)
- ARP Poisoning Theory
- ARP Spoofing using arpspoof
- Bettercap Basics
- ARP Spoofing Using Bettercap
- Spying on Network Devices (Capturing Passwords, Visited Websites…etc)
- Creating Custom Spoofing Script
- Understanding HTTPS & How to Bypass it
- Bypassing HTTPS
- Bypassing HSTS
- DNS Spoofing – Redirecting Requests From One Website To Another
- Injecting Javascript Code
- Wireshark – Basic Overview & How To Use It With MITM Attacks
- Wireshark – Sniffing Data & Analysing Data
- Wireshark – Using Filters, Tracing & Dissecting Packets
- Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network
- Creating a Fake Access Point – Theory
- Creating a Fake AP Using Mana-Toolkit
-
Post Connection Attacks - Gaining Full Control Over Devices On The Same Network
- Bonus – Installing Veil 3.1
- Bonus – Veil Overview & Payloads Basics
- Bonus – Generating An Undetectable Backdoor Using Veil 3
- Bonus – Listening For Incoming Connections
- Bonus – Using A Basic Delivery Method To Test The Backdoor and Hack Windows 10
- Creating a Fake Update & Hacking Any Client in the Network
- Meterpreter Basics – Interacting With Hacked Clients
-
ARP Poisonning Detection & Security
-
Bonus Section