- Introduction 1
- Introduction & Course OutlineLecture1.1
 
 - Preparation - Setting Up The Lab 8
- Lab OverviewLecture2.106 min
 - Initial PreparationLecture2.209 min
 - Installing Kali Linux as a VM on WindowsLecture2.309 min
 - Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
 - Installing Kali Linux as a VM on LinuxLecture2.511 min
 - Kali Linux OverviewLecture2.605 min
 - The Linux Terminal & Basic CommandsLecture2.710 min
 - More Powerful Linux Terminals with AI FeaturesLecture2.805 min
 
 - Network Basics 4
- Network BasicsLecture3.104 min
 - Connecting a Wireless Adapter To KaliLecture3.207 min
 - MAC Address – What Is It & How To Change ItLecture3.308 min
 - Wireless Modes (Managed & Monitor mode)Lecture3.407 min
 
 - Pre-Connection Attacks 4
- Packet Sniffing Basics Using Airodump-ngLecture4.107 min
 - WiFi Bands – 2.4Ghz & 5Ghz FrequenciesLecture4.208 min
 - Targeted Packet Sniffing Using Airodump-ngLecture4.311 min
 - Deauthentication Attack (Disconnecting Any Device From The Network)Lecture4.408 min
 
 - Gaining Access 1
- Gaining Access IntroductionLecture5.1
 
 - Gaining Access - WEP Cracking 6
- Theory Behind Cracking WEP EncryptionLecture6.106 min
 - Basic CaseLecture6.206 min
 - Associating With Target Network Using Fake Authentication AttackLecture6.307 min
 - Packet Injection – ARP Request Reply AttackLecture6.406 min
 - Packet Injection – Korek Chopchop AttackLecture6.508 min
 - Packet Injection – Fragmentation AttackLecture6.6
 
 - Gaining Access - WPA/WPA2 Cracking 8
- Introduction to WPA / WPA2 CrackingLecture7.104 min
 - Exploiting WPS FeatureLecture7.208 min
 - How To Capture The HandshakeLecture7.307 min
 - Creating a Wordlist / DictionaryLecture7.408 min
 - Cracking the Key Using a Wordlist AttackLecture7.506 min
 - Cracking the Key Quicker using a Rainbow TableLecture7.6
 - Cracking WPA/WPA2 Much Faster Using GPU – Part 1Lecture7.707 min
 - Cracking WPA/WPA2 Much Faster Using GPU – Part 2Lecture7.811 min
 
 - Gaining Access - Security & Mitigation 2
- Securing Your Network From The Above AttacksLecture8.102 min
 - How to Configure Wireless Security Settings To Secure Your NetworkLecture8.206 min
 
 - Post Connection Attacks 3
- Post Connection Attacks IntroductionLecture9.1
 - Installing Windows As a Virtual MachineLecture9.206 min
 - Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture9.305 min
 
 - Post Connection Attacks - Information Gathering 3
- Discovering Connected Clients using netdiscoverLecture10.109 min
 - Gathering More Information Using ZenmapLecture10.207 min
 - Gathering Even More Information Using ZenmapLecture10.308 min
 
 - Post Connections Attacks - Man In The Middle Attacks (MITM) 17
- ARP Poisoning TheoryLecture11.1
 - ARP Poisoning using arpspoofLecture11.207 min
 - Bettercap BasicsLecture11.308 min
 - ARP Poisoning Using BettercapLecture11.408 min
 - Spying on Network Devices (Capturing Passwords, Visited Websites…etc)Lecture11.505 min
 - Creating Custom Spoofing ScriptLecture11.610 min
 - Understanding HTTPS & How to Bypass itLecture11.706 min
 - Bypassing HTTPSLecture11.811 min
 - Bypassing HSTSLecture11.910 min
 - DNS Spoofing – Redirecting Requests From One Website To AnotherLecture11.1011 min
 - Injecting Javascript CodeLecture11.1110 min
 - Wireshark – Basic Overview & How To Use It With MITM AttacksLecture11.1208 min
 - Wireshark – Sniffing Data & Analysing DataLecture11.1306 min
 - Wireshark – Using Filters, Tracing & Dissecting PacketsLecture11.1406 min
 - Wireshark – Capturing Passwords & Anything Sent By Any Device In The NetworkLecture11.1508 min
 - Creating a Fake Access Point – TheoryLecture11.1607 min
 - Creating a Fake AP Using Mana-ToolkitLecture11.1710 min
 
 - Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 7
- Bonus – Installing Veil 3.1Lecture12.104 min
 - Bonus – Veil Overview & Payloads BasicsLecture12.207 min
 - Bonus – Generating An Undetectable Backdoor Using Veil 3Lecture12.310 min
 - Bonus – Listening For Incoming ConnectionsLecture12.407 min
 - Bonus – Using A Basic Delivery Method To Test The Backdoor and Hack Windows 10Lecture12.507 min
 - Creating a Fake Update & Hacking Any Client in the NetworkLecture12.612 min
 - Meterpreter Basics – Interacting With Hacked ClientsLecture12.706 min
 
 - ARP Poisonning Detection & Security 2
- Detecting ARP Poisoning AttacksLecture13.105 min
 - Detecting Suspicious Activities using WiresharkLecture13.206 min
 
 - Bonus Section 1
- Bonus Lecture – What’s Next?Lecture14.103 min
 
 
This content is protected, please login and enroll course to view this content!
