- Introduction 1
- Introduction & Course OutlineLecture1.1
- Preparation - Setting Up The Lab 8
- Lab OverviewLecture2.106 min
- Initial PreparationLecture2.209 min
- Installing Kali Linux as a VM on WindowsLecture2.309 min
- Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
- Installing Kali Linux as a VM on LinuxLecture2.511 min
- Kali Linux OverviewLecture2.605 min
- The Linux Terminal & Basic CommandsLecture2.710 min
- More Powerful Linux Terminals with AI FeaturesLecture2.805 min
- Network Basics 4
- Network BasicsLecture3.104 min
- Connecting a Wireless Adapter To KaliLecture3.207 min
- MAC Address – What Is It & How To Change ItLecture3.308 min
- Wireless Modes (Managed & Monitor mode)Lecture3.407 min
- Pre-Connection Attacks 4
- Packet Sniffing Basics Using Airodump-ngLecture4.107 min
- WiFi Bands – 2.4Ghz & 5Ghz FrequenciesLecture4.208 min
- Targeted Packet Sniffing Using Airodump-ngLecture4.311 min
- Deauthentication Attack (Disconnecting Any Device From The Network)Lecture4.408 min
- Gaining Access 1
- Gaining Access IntroductionLecture5.1
- Gaining Access - WEP Cracking 6
- Theory Behind Cracking WEP EncryptionLecture6.106 min
- Basic CaseLecture6.206 min
- Associating With Target Network Using Fake Authentication AttackLecture6.307 min
- Packet Injection – ARP Request Reply AttackLecture6.406 min
- Packet Injection – Korek Chopchop AttackLecture6.508 min
- Packet Injection – Fragmentation AttackLecture6.6
- Gaining Access - WPA/WPA2 Cracking 8
- Introduction to WPA / WPA2 CrackingLecture7.104 min
- Exploiting WPS FeatureLecture7.208 min
- How To Capture The HandshakeLecture7.307 min
- Creating a Wordlist / DictionaryLecture7.408 min
- Cracking the Key Using a Wordlist AttackLecture7.506 min
- Cracking the Key Quicker using a Rainbow TableLecture7.6
- Cracking WPA/WPA2 Much Faster Using GPU – Part 1Lecture7.707 min
- Cracking WPA/WPA2 Much Faster Using GPU – Part 2Lecture7.811 min
- Gaining Access - Security & Mitigation 2
- Securing Your Network From The Above AttacksLecture8.102 min
- How to Configure Wireless Security Settings To Secure Your NetworkLecture8.206 min
- Post Connection Attacks 3
- Post Connection Attacks IntroductionLecture9.1
- Installing Windows As a Virtual MachineLecture9.206 min
- Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture9.305 min
- Post Connection Attacks - Information Gathering 3
- Discovering Connected Clients using netdiscoverLecture10.109 min
- Gathering More Information Using ZenmapLecture10.207 min
- Gathering Even More Information Using ZenmapLecture10.308 min
- Post Connections Attacks - Man In The Middle Attacks (MITM) 17
- ARP Poisoning TheoryLecture11.1
- ARP Poisoning using arpspoofLecture11.207 min
- Bettercap BasicsLecture11.308 min
- ARP Poisoning Using BettercapLecture11.408 min
- Spying on Network Devices (Capturing Passwords, Visited Websites…etc)Lecture11.505 min
- Creating Custom Spoofing ScriptLecture11.610 min
- Understanding HTTPS & How to Bypass itLecture11.706 min
- Bypassing HTTPSLecture11.811 min
- Bypassing HSTSLecture11.910 min
- DNS Spoofing – Redirecting Requests From One Website To AnotherLecture11.1011 min
- Injecting Javascript CodeLecture11.1110 min
- Wireshark – Basic Overview & How To Use It With MITM AttacksLecture11.1208 min
- Wireshark – Sniffing Data & Analysing DataLecture11.1306 min
- Wireshark – Using Filters, Tracing & Dissecting PacketsLecture11.1406 min
- Wireshark – Capturing Passwords & Anything Sent By Any Device In The NetworkLecture11.1508 min
- Creating a Fake Access Point – TheoryLecture11.1607 min
- Creating a Fake AP Using Mana-ToolkitLecture11.1710 min
- Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 7
- Bonus – Installing Veil 3.1Lecture12.104 min
- Bonus – Veil Overview & Payloads BasicsLecture12.207 min
- Bonus – Generating An Undetectable Backdoor Using Veil 3Lecture12.310 min
- Bonus – Listening For Incoming ConnectionsLecture12.407 min
- Bonus – Using A Basic Delivery Method To Test The Backdoor and Hack Windows 10Lecture12.507 min
- Creating a Fake Update & Hacking Any Client in the NetworkLecture12.612 min
- Meterpreter Basics – Interacting With Hacked ClientsLecture12.706 min
- ARP Poisonning Detection & Security 2
- Detecting ARP Poisoning AttacksLecture13.105 min
- Detecting Suspicious Activities using WiresharkLecture13.206 min
- Bonus Section 1
- Bonus Lecture – What’s Next?Lecture14.103 min
