Network Hacking Continued – Intermediate to Advanced

User Avatar
(5 reviews)
All levels
84
10 hours
90390
$195.00 $99.00

Take your Network Hacking skills to the next level!

Do you want to take your network hacking skills to the next level? how about building your own network hacking scripts?

All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life scenario.

By by the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

You’ll also learn how to write your own MITM scripts to implement these attacks.

This course is designed to build up on what you already know about network hacking, therefore I recommend finishing the network hacking section of my general ethical hacking course or finishing my network hacking course before starting this one.

Network Hacking Continued - Intermediate to Advanced course content

Learn advanced WPA/WPA2 cracking methods
Learn advanced network hacking techniques
Hack more secure networks
Build your own network hacking scripts

Why is this course so in demand?

Lifetime access to course materials and videos
Set the pace of your own study
Learn the way that best suits you
Get answers from our Support Team within 15 hours
Verifiable zSecurity certificate of completion
Unlimited updates to course materials and videos

Plus! Free 1-month VIP membership with:

Live mentoring and Q&A session with course instructor and CTO, Zaid
Instant support from community members through our private discord channel
Daily updates with the latest tutorials and news from the hacking world
Daily resources like CTFs, bug bounty programs, onion services and more
Access our VIP community and connect with like-minded people
Discounts and offers on other zSecurity products and services

Here's how it works

Just like all of my other courses, this course is highly practical, but it will not neglect the theory, since this is an advanced course we will be breaking each attack into its smaller components and understand how each of these components work. By the end of the course you will be able to mix these attacks and adopt them to suit different situations and different scenarios, you will also be able to write your own man in the middle scripts to implement your own attacks

What do you need to complete the Network Hacking Continued - Intermediate to Advanced course?

Basic Information Technology knowledge
No Linux, programming or hacking knowledge
Computer with a minimum of 4GB RAM/Memory
Operating System: Windows / OS X / Linux
WiFi cracking (10 lectures ONLY): WiFi adapter supporting monitor mode
$195.00 $99.00

Reviews

5
5 ratings
5
100%
4
0%
3
0%
2
0%
1
0%
  • Toni Tuunainen

    After the social engineering course, I enrolled in "Network Hacking Continued - Intermediate to Advanced", this course will give you more advanced options for Network hacking and different methods totally. Its really recommended going first with "Learn Ethical Hacking from Scratch or Learn Networking Hacking from Scratch". In this course were very well explained things, and we manage to do even some scripts since I have a years lack of motivation for programming, this course really made me enjoy it, even it was not much of programming we did on it. Zaid teaching methods still positively surprise me, dude clearly knows his things and knowledge of this subject. After rolling on what? 5 of his courses I have been extremely satisfied and it won't stop on there.

  • Raymund Paglinawan

    I really learn a lot with this course especially it is more focus on network hacking. Again I would definitely recommend the Zaid's courses to anyone who want to learn ethical hacking. Thanks again for teaching such a great course!!!

Curriculum

  • Introduction 2

  • Back To Basics/Pre-Connection Attacks 7

    • Lecture2.1
      Pre-connection Attacks Overview 02 min
    • Lecture2.2
      Spoofing Mac Address Manually 03 min
    • Lecture2.3
      Targeting 5 GHz Networks 07 min
    • Lecture2.4
      Deauthenticating a Client From Protected WiFi Networks 07 min
    • Lecture2.5
      Deauthenticating Multiple Clients From Protected WiFi Networks 08 min
    • Lecture2.6
      Deauthenticating All Clients From Protected WiFi Network 06 min
    • Lecture2.7
      Deauthenticating Same Client From Multiple Bands or Networks 09 min
  • Gaining Access 6

    • Lecture3.1
      Gaining Access Overview 02 min
    • Lecture3.2
      Discovering Names of Hidden Networks 08 min
    • Lecture3.3
      Connecting To Hidden Networks 05 min
    • Lecture3.4
      Bypassing Mac Filtering (Blacklists & Whitelists) 09 min
    • Lecture3.5
      Cracking SKA WEP Networks 09 min
    • Lecture3.6
      Securing Systems From The Above Attacks 03 min
  • Gaining Access - Captive Portals 13

    • Lecture4.1
      Sniffing Captive Portal Login Information In Monitor Mode 10 min
    • Lecture4.2
      Sniffing Captive Portal Login Information Using ARP Spoofing 09 min
    • Lecture4.3
      Creating a Fake Captive Portal – Introduction 04 min
    • Lecture4.4
      Creating Login Page – Cloning a Login Page 07 min
    • Lecture4.5
      Creating Login Page – Fixing Relative Links 07 min
    • Lecture4.6
      Creating Login Page – Adding Form Tag 08 min
    • Lecture4.7
      Creating Login Page – Adding Submit Button 07 min
    • Lecture4.8
      Preparing Computer To Run Fake Captive Portal 08 min
    • Lecture4.9
      Starting The Fake Captive Portal 12 min
    • Lecture4.10
      Redirecting Requests To Captive Portal Login Page 12 min
    • Lecture4.11
      Generating Fake SSL Certificate 06 min
    • Lecture4.12
      Enabling SSL/HTTPS On Webserver 08 min
    • Lecture4.13
      Sniffing & Analysing Login Credentials 06 min
  • Gaining Access - WPA/WPA2 Cracking - Exploiting WPS 5

    • Lecture5.1
      Exploiting WPS – Introduction 01 min
    • Lecture5.2
      Bypassing “Failed to associate” Issue 08 min
    • Lecture5.3
      Bypassing 0x3 and 0x4 Errors 08 min
    • Lecture5.4
      WPS Lock – What Is It & How To Bypass It 07 min
    • Lecture5.5
      Unlocking WPS 09 min
  • Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack 6

    • Lecture6.1
      Advanced Wordlist Attacks – Introduction 02 min
    • Lecture6.2
      Saving Aircrack-ng Cracking Progress 10 min
    • Lecture6.3
      Using Huge Wordlists With Aircrack-ng Without Wasting Storage 07 min
    • Lecture6.4
      Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 10 min
    • Lecture6.5
      Cracking WPA/WPA2 Much Faster Using GPU – Part 1 07 min
    • Lecture6.6
      Cracking WPA/WPA2 Much Faster Using GPU – Part 2 10 min
  • Gaining Access - WPA/WPA Cracking - Evil Twin Attack 4

    • Lecture7.1
      What is It & How it Works 07 min
    • Lecture7.2
      Installing Needed Software 07 min
    • Lecture7.3
      Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 09 min
    • Lecture7.4
      Debugging & Fixing Login Interface 12 min
  • Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise 5

    • Lecture8.1
      What is WPA/WPA2 Enterprise & How it Works 05 min
    • Lecture8.2
      2 Methods To Hack WPA & WPA2 Enterprise 07 min
    • Lecture8.3
      Stealing Login Credentials 08 min
    • Lecture8.4
      Cracking Login Credentials 06 min
    • Lecture8.5
      Securing Systems From The Above Gaining Access Attacks 05 min
  • Post Connection Attacks 7

    • Lecture9.1
      Post Connection Attacks Overview 04 min
    • Lecture9.2
      Ettercap – Basic Overview 07 min
    • Lecture9.3
      Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 10 min
    • Lecture9.4
      Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 13 min
    • Lecture9.5
      Automatically ARP Poisoning New Clients 06 min
    • Lecture9.6
      DNS Spoofing Using Ettercap 05 min
    • Lecture9.7
      Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 09 min
  • Post Connection Attacks - Analyzing Data Flows & Running Custom Attacks 10

    • Lecture10.1
      Introduction to MITMproxy 04 min
    • Lecture10.2
      Using MITMproxy In Explicit Mode 07 min
    • Lecture10.3
      Analysing (Filtering & Highlighting) Flows 05 min
    • Lecture10.4
      Intercepting Network Flows 05 min
    • Lecture10.5
      Modifying Responses & Injecting Javascript Manually 09 min
    • Lecture10.6
      Intercepting & Modifying Responses In Transparent Mode 07 min
    • Lecture10.7
      Editing Responses & Injecting BeEF’s Code On The Fly 09 min
    • Lecture10.8
      Editing Responses Automatically Based On Regex 09 min
    • Lecture10.9
      [Bonus] – Stealing Login Info Using Fake Login Prompt 07 min
    • Lecture10.10
      [Bonus] – Hacking Windows 10 Using A Fake Update 05 min
  • Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks 14

    • Lecture11.1
      Introduction to MITM Scripts? 06 min
    • Lecture11.2
      Capturing & Printing Requests/Responses 08 min
    • Lecture11.3
      Filtering Flows & Extracting Useful Data 09 min
    • Lecture11.4
      Using Conditions To Execute Code On Useful Flows 10 min
    • Lecture11.5
      Generating Custom HTTP Responses 08 min
    • Lecture11.6
      Testing Script Locally 08 min
    • Lecture11.7
      Generating Trojans – Installing The Trojan Factory 06 min
    • Lecture11.8
      Generating Trojans – Converting Any File (eg:image) To a Trojan 10 min
    • Lecture11.9
      Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 07 min
    • Lecture11.10
      Executing Bash Commands & Calling Trojan Factory From Our Script 09 min
    • Lecture11.11
      Using Variables & More Complex Conditions 09 min
    • Lecture11.12
      Converting Downloads To Trojans On The Fly 10 min
    • Lecture11.13
      Configuring The Trojan Factory’s MITMproxy Script 07 min
    • Lecture11.14
      Using The Trojan Factory MITMproxy Script 08 min
  • Post-Connection Attacks - Doing All Of The Above On HTTPS Websites 4

    • Lecture12.1
      Bypassing HTTPS With MITMproxy 06 min
    • Lecture12.2
      Replacing Downloads From HTTPS 05 min
    • Lecture12.3
      Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites 06 min
    • Lecture12.4
      Securing Systems From The Above Post Connection Attacks 06 min
  • Bonus Section 1

    • Lecture13.1
      Bonus Lecture – What’s Next?

Your instructor

Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016. Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company. In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking. He now offers a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity. Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"