-
Introduction 1
-
Introduction & Course OutlineLecture1.1
-
-
Preparation - Setting Up The Lab 8
-
Lab OverviewLecture2.106 min
-
Initial PreparationLecture2.209 min
-
Installing Kali Linux as a VM on WindowsLecture2.309 min
-
Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
-
Installing Kali Linux as a VM on LinuxLecture2.511 min
-
Kali Linux OverviewLecture2.605 min
-
The Linux Terminal & Basic CommandsLecture2.710 min
-
More Powerful Linux Terminals with AI FeaturesLecture2.805 min
-
-
Network Basics 4
-
Network BasicsLecture3.104 min
-
Connecting a Wireless Adapter To KaliLecture3.207 min
-
MAC Address – What Is It & How To Change ItLecture3.308 min
-
Wireless Modes (Managed & Monitor mode)Lecture3.407 min
-
-
Pre-Connection Attacks 4
-
Packet Sniffing Basics Using Airodump-ngLecture4.107 min
-
WiFi Bands – 2.4Ghz & 5Ghz FrequenciesLecture4.208 min
-
Targeted Packet Sniffing Using Airodump-ngLecture4.311 min
-
Deauthentication Attack (Disconnecting Any Device From The Network)Lecture4.408 min
-
-
Gaining Access 1
-
Gaining Access IntroductionLecture5.1
-
-
Gaining Access - WEP Cracking 6
-
Theory Behind Cracking WEP EncryptionLecture6.106 min
-
Basic CaseLecture6.206 min
-
Associating With Target Network Using Fake Authentication AttackLecture6.307 min
-
Packet Injection – ARP Request Reply AttackLecture6.406 min
-
Packet Injection – Korek Chopchop AttackLecture6.508 min
-
Packet Injection – Fragmentation AttackLecture6.6
-
-
Gaining Access - WPA/WPA2 Cracking 8
-
Introduction to WPA / WPA2 CrackingLecture7.104 min
-
Exploiting WPS FeatureLecture7.208 min
-
How To Capture The HandshakeLecture7.307 min
-
Creating a Wordlist / DictionaryLecture7.408 min
-
Cracking the Key Using a Wordlist AttackLecture7.506 min
-
Cracking the Key Quicker using a Rainbow TableLecture7.6
-
Cracking WPA/WPA2 Much Faster Using GPU – Part 1Lecture7.707 min
-
Cracking WPA/WPA2 Much Faster Using GPU – Part 2Lecture7.811 min
-
-
Gaining Access - Security & Mitigation 2
-
Securing Your Network From The Above AttacksLecture8.102 min
-
How to Configure Wireless Security Settings To Secure Your NetworkLecture8.206 min
-
-
Post Connection Attacks 3
-
Post Connection Attacks IntroductionLecture9.1
-
Installing Windows As a Virtual MachineLecture9.206 min
-
Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture9.305 min
-
-
Post Connection Attacks - Information Gathering 3
-
Discovering Connected Clients using netdiscoverLecture10.109 min
-
Gathering More Information Using ZenmapLecture10.207 min
-
Gathering Even More Information Using ZenmapLecture10.308 min
-
-
Post Connections Attacks - Man In The Middle Attacks (MITM) 17
-
ARP Poisoning TheoryLecture11.1
-
ARP Poisoning using arpspoofLecture11.207 min
-
Bettercap BasicsLecture11.308 min
-
ARP Poisoning Using BettercapLecture11.408 min
-
Spying on Network Devices (Capturing Passwords, Visited Websites…etc)Lecture11.505 min
-
Creating Custom Spoofing ScriptLecture11.610 min
-
Understanding HTTPS & How to Bypass itLecture11.706 min
-
Bypassing HTTPSLecture11.811 min
-
Bypassing HSTSLecture11.910 min
-
DNS Spoofing – Redirecting Requests From One Website To AnotherLecture11.1011 min
-
Injecting Javascript CodeLecture11.1110 min
-
Wireshark – Basic Overview & How To Use It With MITM AttacksLecture11.1208 min
-
Wireshark – Sniffing Data & Analysing DataLecture11.1306 min
-
Wireshark – Using Filters, Tracing & Dissecting PacketsLecture11.1406 min
-
Wireshark – Capturing Passwords & Anything Sent By Any Device In The NetworkLecture11.1508 min
-
Creating a Fake Access Point – TheoryLecture11.1607 min
-
Creating a Fake AP Using Mana-ToolkitLecture11.1710 min
-
-
Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 7
-
Bonus – Installing Veil 3.1Lecture12.104 min
-
Bonus – Veil Overview & Payloads BasicsLecture12.207 min
-
Bonus – Generating An Undetectable Backdoor Using Veil 3Lecture12.310 min
-
Bonus – Listening For Incoming ConnectionsLecture12.407 min
-
Bonus – Using A Basic Delivery Method To Test The Backdoor and Hack Windows 10Lecture12.507 min
-
Creating a Fake Update & Hacking Any Client in the NetworkLecture12.612 min
-
Meterpreter Basics – Interacting With Hacked ClientsLecture12.706 min
-
-
ARP Poisonning Detection & Security 2
-
Detecting ARP Poisoning AttacksLecture13.105 min
-
Detecting Suspicious Activities using WiresharkLecture13.206 min
-
-
Bonus Section 1
-
Bonus Lecture – What’s Next?Lecture14.103 min
-
This content is protected, please login and enroll course to view this content!
