• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      • Home
      • All courses
      • Ethical Hacking
      • Network Hacking Continued – Intermediate to Advanced
      CoursesEthical HackingNetwork Hacking Continued – Intermediate to Advanced
      • Introduction 2

        • Lecture1.1
          Teaser – Converting Downloads To Trojans On The Fly & Hacking Windows 10 07 min
        • Lecture1.2
          Course Overview 05 min
      • Back To Basics/Pre-Connection Attacks 6

        • Lecture2.1
          Pre-connection Attacks Overview 02 min
        • Lecture2.2
          Spoofing Mac Address Manually 03 min
        • Lecture2.3
          Targeting 5 GHz Networks 07 min
        • Lecture2.4
          Deauthenticating a Client From Protected WiFi Networks 07 min
        • Lecture2.5
          Deauthenticating Multiple Clients From Protected WiFi Networks 08 min
        • Lecture2.6
          Deauthenticating All Clients From Protected WiFi Network 06 min
      • Gaining Access 6

        • Lecture3.1
          Gaining Access Overview 02 min
        • Lecture3.2
          Discovering Names of Hidden Networks 08 min
        • Lecture3.3
          Connecting To Hidden Networks 05 min
        • Lecture3.4
          Bypassing Mac Filtering (Blacklists & Whitelists) 09 min
        • Lecture3.5
          Cracking SKA WEP Networks 09 min
        • Lecture3.6
          Securing Systems From The Above Attacks 03 min
      • Gaining Access - Captive Portals 13

        • Lecture4.1
          Sniffing Captive Portal Login Information In Monitor Mode 10 min
        • Lecture4.2
          Sniffing Captive Portal Login Information Using ARP Spoofing 09 min
        • Lecture4.3
          Creating a Fake Captive Portal – Introduction 04 min
        • Lecture4.4
          Creating Login Page – Cloning a Login Page 07 min
        • Lecture4.5
          Creating Login Page – Fixing Relative Links 07 min
        • Lecture4.6
          Creating Login Page – Adding Form Tag 08 min
        • Lecture4.7
          Creating Login Page – Adding Submit Button 07 min
        • Lecture4.8
          Preparing Computer To Run Fake Captive Portal 08 min
        • Lecture4.9
          Starting The Fake Captive Portal 12 min
        • Lecture4.10
          Redirecting Requests To Captive Portal Login Page 12 min
        • Lecture4.11
          Generating Fake SSL Certificate 06 min
        • Lecture4.12
          Enabling SSL/HTTPS On Webserver 08 min
        • Lecture4.13
          Sniffing & Analysing Login Credentials 06 min
      • Gaining Access - WPA/WPA2 Cracking - Exploiting WPS 5

        • Lecture5.1
          Exploiting WPS – Introduction 01 min
        • Lecture5.2
          Bypassing “Failed to associate” Issue 08 min
        • Lecture5.3
          Bypassing 0x3 and 0x4 Errors 08 min
        • Lecture5.4
          WPS Lock – What Is It & How To Bypass It 07 min
        • Lecture5.5
          Unlocking WPS 09 min
      • Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack 6

        • Lecture6.1
          Advanced Wordlist Attacks – Introduction 02 min
        • Lecture6.2
          Saving Aircrack-ng Cracking Progress 10 min
        • Lecture6.3
          Using Huge Wordlists With Aircrack-ng Without Wasting Storage 07 min
        • Lecture6.4
          Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 10 min
        • Lecture6.5
          Cracking WPA/WPA2 Much Faster Using GPU – Part 1 07 min
        • Lecture6.6
          Cracking WPA/WPA2 Much Faster Using GPU – Part 2 10 min
      • Gaining Access - WPA/WPA Cracking - Evil Twin Attack 4

        • Lecture7.1
          What is It & How it Works 07 min
        • Lecture7.2
          Installing Needed Software 07 min
        • Lecture7.3
          Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 09 min
        • Lecture7.4
          Debugging & Fixing Login Interface 12 min
      • Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise 5

        • Lecture8.1
          What is WPA/WPA2 Enterprise & How it Works 05 min
        • Lecture8.2
          2 Methods To Hack WPA & WPA2 Enterprise 07 min
        • Lecture8.3
          Stealing Login Credentials 08 min
        • Lecture8.4
          Cracking Login Credentials 06 min
        • Lecture8.5
          Securing Systems From The Above Gaining Access Attacks 05 min
      • Post Connection Attacks 7

        • Lecture9.1
          Post Connection Attacks Overview 04 min
        • Lecture9.2
          Ettercap – Basic Overview 07 min
        • Lecture9.3
          Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 10 min
        • Lecture9.4
          Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 13 min
        • Lecture9.5
          Automatically ARP Poisoning New Clients 06 min
        • Lecture9.6
          DNS Spoofing Using Ettercap 05 min
        • Lecture9.7
          Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 09 min
      • Post Connection Attacks - Analyzing Data Flows & Running Custom Attacks 10

        • Lecture10.1
          Introduction to MITMproxy 04 min
        • Lecture10.2
          Using MITMproxy In Explicit Mode 07 min
        • Lecture10.3
          Analysing (Filtering & Highlighting) Flows 05 min
        • Lecture10.4
          Intercepting Network Flows 05 min
        • Lecture10.5
          Modifying Responses & Injecting Javascript Manually 09 min
        • Lecture10.6
          Intercepting & Modifying Responses In Transparent Mode 07 min
        • Lecture10.7
          Editing Responses & Injecting BeEF’s Code On The Fly 09 min
        • Lecture10.8
          Editing Responses Automatically Based On Regex 09 min
        • Lecture10.9
          [Bonus] – Stealing Login Info Using Fake Login Prompt 07 min
        • Lecture10.10
          [Bonus] – Hacking Windows 10 Using A Fake Update 05 min
      • Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks 14

        • Lecture11.1
          Introduction to MITM Scripts? 06 min
        • Lecture11.2
          Capturing & Printing Requests/Responses 08 min
        • Lecture11.3
          Filtering Flows & Extracting Useful Data 09 min
        • Lecture11.4
          Using Conditions To Execute Code On Useful Flows 10 min
        • Lecture11.5
          Generating Custom HTTP Responses 08 min
        • Lecture11.6
          Testing Script Locally 08 min
        • Lecture11.7
          Generating Trojans – Installing The Trojan Factory 06 min
        • Lecture11.8
          Generating Trojans – Converting Any File (eg:image) To a Trojan 10 min
        • Lecture11.9
          Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 07 min
        • Lecture11.10
          Executing Bash Commands & Calling Trojan Factory From Our Script 09 min
        • Lecture11.11
          Using Variables & More Complex Conditions 09 min
        • Lecture11.12
          Converting Downloads To Trojans On The Fly 10 min
        • Lecture11.13
          Configuring The Trojan Factory’s MITMproxy Script 07 min
        • Lecture11.14
          Using The Trojan Factory MITMproxy Script 08 min
      • Post-Connection Attacks - Doing All Of The Above On HTTPS Websites 4

        • Lecture12.1
          Bypassing HTTPS With MITMproxy 06 min
        • Lecture12.2
          Replacing Downloads From HTTPS 05 min
        • Lecture12.3
          Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites 06 min
        • Lecture12.4
          Securing Systems From The Above Post Connection Attacks 06 min
      • Bonus Section 1

        • Lecture13.1
          Bonus Lecture – What’s Next?
        This content is protected, please login and enroll course to view this content!
        Prev Converting Downloads To Trojans On The Fly
        Next Using The Trojan Factory MITMproxy Script

        “Everything related to ethical hacking

        & cyber security in one place.”

        Quick Links

        • Home
        • About Us
        • Hacking & Security
        • Contact
        • FAQ

        Services

        • Penetration Testing
        • Consulting
        • Code Review
        • One on one training
        • VPN
        • VIP Membership

        Company

        • About Us
        • Contact

        Support

        • FAQ
        • Forums

        Copyright © 2021 zSecurity Ltd. All rights reserved.

        • Privacy
        • Terms

        Contribute

        Share your knowledge with the world

        SUBMIT AN ARTICLE

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account

        Are you a member? Login now