Curriculum
- Introduction
- Back To Basics/Pre-Connection Attacks
- Pre-connection Attacks Overview
- Spoofing Mac Address Manually
- Targeting 5 GHz Networks
- Deauthenticating a Client From Protected WiFi Networks
- Deauthenticating Multiple Clients From Protected WiFi Networks
- Deauthenticating All Clients From Protected WiFi Network
- Deauthenticating Same Client From Multiple Bands or Networks
- Gaining Access
- Gaining Access - Captive Portals
- Sniffing Captive Portal Login Information In Monitor Mode
- Sniffing Captive Portal Login Information Using ARP Spoofing
- Creating a Fake Captive Portal – Introduction
- Creating Login Page – Cloning a Login Page
- Creating Login Page – Fixing Relative Links
- Creating Login Page – Adding Form Tag
- Creating Login Page – Adding Submit Button
- Preparing Computer To Run Fake Captive Portal
- Starting The Fake Captive Portal
- Redirecting Requests To Captive Portal Login Page
- Generating Fake SSL Certificate
- Enabling SSL/HTTPS On Webserver
- Sniffing & Analysing Login Credentials
- Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
- Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
- Advanced Wordlist Attacks – Introduction
- Saving Aircrack-ng Cracking Progress
- Using Huge Wordlists With Aircrack-ng Without Wasting Storage
- Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
- Cracking WPA/WPA2 Much Faster Using GPU – Part 1
- Cracking WPA/WPA2 Much Faster Using GPU – Part 2
- Gaining Access - WPA/WPA Cracking - Evil Twin Attack
- Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
- Post Connection Attacks
- Post Connection Attacks Overview
- Ettercap – Basic Overview
- Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
- Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites
- Automatically ARP Poisoning New Clients
- DNS Spoofing Using Ettercap
- Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms
- Post Connection Attacks - Analyzing Data Flows & Running Custom Attacks
- Introduction to MITMproxy
- Using MITMproxy In Explicit Mode
- Analysing (Filtering & Highlighting) Flows
- Intercepting Network Flows
- Modifying Responses & Injecting Javascript Manually
- Intercepting & Modifying Responses In Transparent Mode
- Editing Responses & Injecting BeEF’s Code On The Fly
- Editing Responses Automatically Based On Regex
- [Bonus] – Stealing Login Info Using Fake Login Prompt
- [Bonus] – Hacking Windows 10 Using A Fake Update
- Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
- Introduction to MITM Scripts?
- Capturing & Printing Requests/Responses
- Filtering Flows & Extracting Useful Data
- Using Conditions To Execute Code On Useful Flows
- Generating Custom HTTP Responses
- Testing Script Locally
- Generating Trojans – Installing The Trojan Factory
- Generating Trojans – Converting Any File (eg:image) To a Trojan
- Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
- Executing Bash Commands & Calling Trojan Factory From Our Script
- Using Variables & More Complex Conditions
- Converting Downloads To Trojans On The Fly
- Configuring The Trojan Factory’s MITMproxy Script
- Using The Trojan Factory MITMproxy Script
- Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
- Bonus Section
Toni Tuunainen
After the social engineering course, I enrolled in "Network Hacking Continued - Intermediate to Advanced", this course will give you more advanced options for Network hacking and different methods totally. Its really recommended going first with "Learn Ethical Hacking from Scratch or Learn Networking Hacking from Scratch". In this course were very well explained things, and we manage to do even some scripts since I have a years lack of motivation for programming, this course really made me enjoy it, even it was not much of programming we did on it. Zaid teaching methods still positively surprise me, dude clearly knows his things and knowledge of this subject. After rolling on what? 5 of his courses I have been extremely satisfied and it won't stop on there.Raymund Paglinawan
I really learn a lot with this course especially it is more focus on network hacking. Again I would definitely recommend the Zaid's courses to anyone who want to learn ethical hacking. Thanks again for teaching such a great course!!!