• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      • Home
      • All courses
      • Ethical Hacking
      • Network Hacking Continued – Intermediate to Advanced
      CoursesEthical HackingNetwork Hacking Continued – Intermediate to Advanced
      • Introduction 2

        • Lecture1.1
          Teaser – Converting Downloads To Trojans On The Fly & Hacking Windows 10 07 min
        • Lecture1.2
          Course Overview 05 min
      • Back To Basics/Pre-Connection Attacks 6

        • Lecture2.1
          Pre-connection Attacks Overview 02 min
        • Lecture2.2
          Spoofing Mac Address Manually 03 min
        • Lecture2.3
          Targeting 5 GHz Networks 07 min
        • Lecture2.4
          Deauthenticating a Client From Protected WiFi Networks 07 min
        • Lecture2.5
          Deauthenticating Multiple Clients From Protected WiFi Networks 08 min
        • Lecture2.6
          Deauthenticating All Clients From Protected WiFi Network 06 min
      • Gaining Access 6

        • Lecture3.1
          Gaining Access Overview 02 min
        • Lecture3.2
          Discovering Names of Hidden Networks 08 min
        • Lecture3.3
          Connecting To Hidden Networks 05 min
        • Lecture3.4
          Bypassing Mac Filtering (Blacklists & Whitelists) 09 min
        • Lecture3.5
          Cracking SKA WEP Networks 09 min
        • Lecture3.6
          Securing Systems From The Above Attacks 03 min
      • Gaining Access - Captive Portals 13

        • Lecture4.1
          Sniffing Captive Portal Login Information In Monitor Mode 10 min
        • Lecture4.2
          Sniffing Captive Portal Login Information Using ARP Spoofing 09 min
        • Lecture4.3
          Creating a Fake Captive Portal – Introduction 04 min
        • Lecture4.4
          Creating Login Page – Cloning a Login Page 07 min
        • Lecture4.5
          Creating Login Page – Fixing Relative Links 07 min
        • Lecture4.6
          Creating Login Page – Adding Form Tag 08 min
        • Lecture4.7
          Creating Login Page – Adding Submit Button 07 min
        • Lecture4.8
          Preparing Computer To Run Fake Captive Portal 08 min
        • Lecture4.9
          Starting The Fake Captive Portal 12 min
        • Lecture4.10
          Redirecting Requests To Captive Portal Login Page 12 min
        • Lecture4.11
          Generating Fake SSL Certificate 06 min
        • Lecture4.12
          Enabling SSL/HTTPS On Webserver 08 min
        • Lecture4.13
          Sniffing & Analysing Login Credentials 06 min
      • Gaining Access - WPA/WPA2 Cracking - Exploiting WPS 5

        • Lecture5.1
          Exploiting WPS – Introduction 01 min
        • Lecture5.2
          Bypassing “Failed to associate” Issue 08 min
        • Lecture5.3
          Bypassing 0x3 and 0x4 Errors 08 min
        • Lecture5.4
          WPS Lock – What Is It & How To Bypass It 07 min
        • Lecture5.5
          Unlocking WPS 09 min
      • Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack 6

        • Lecture6.1
          Advanced Wordlist Attacks – Introduction 02 min
        • Lecture6.2
          Saving Aircrack-ng Cracking Progress 10 min
        • Lecture6.3
          Using Huge Wordlists With Aircrack-ng Without Wasting Storage 07 min
        • Lecture6.4
          Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 10 min
        • Lecture6.5
          Cracking WPA/WPA2 Much Faster Using GPU – Part 1 07 min
        • Lecture6.6
          Cracking WPA/WPA2 Much Faster Using GPU – Part 2 10 min
      • Gaining Access - WPA/WPA Cracking - Evil Twin Attack 4

        • Lecture7.1
          What is It & How it Works 07 min
        • Lecture7.2
          Installing Needed Software 07 min
        • Lecture7.3
          Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 09 min
        • Lecture7.4
          Debugging & Fixing Login Interface 12 min
      • Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise 5

        • Lecture8.1
          What is WPA/WPA2 Enterprise & How it Works 05 min
        • Lecture8.2
          2 Methods To Hack WPA & WPA2 Enterprise 07 min
        • Lecture8.3
          Stealing Login Credentials 08 min
        • Lecture8.4
          Cracking Login Credentials 06 min
        • Lecture8.5
          Securing Systems From The Above Gaining Access Attacks 05 min
      • Post Connection Attacks 7

        • Lecture9.1
          Post Connection Attacks Overview 04 min
        • Lecture9.2
          Ettercap – Basic Overview 07 min
        • Lecture9.3
          Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 10 min
        • Lecture9.4
          Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 13 min
        • Lecture9.5
          Automatically ARP Poisoning New Clients 06 min
        • Lecture9.6
          DNS Spoofing Using Ettercap 05 min
        • Lecture9.7
          Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 09 min
      • Post Connection Attacks - Analyzing Data Flows & Running Custom Attacks 10

        • Lecture10.1
          Introduction to MITMproxy 04 min
        • Lecture10.2
          Using MITMproxy In Explicit Mode 07 min
        • Lecture10.3
          Analysing (Filtering & Highlighting) Flows 05 min
        • Lecture10.4
          Intercepting Network Flows 05 min
        • Lecture10.5
          Modifying Responses & Injecting Javascript Manually 09 min
        • Lecture10.6
          Intercepting & Modifying Responses In Transparent Mode 07 min
        • Lecture10.7
          Editing Responses & Injecting BeEF’s Code On The Fly 09 min
        • Lecture10.8
          Editing Responses Automatically Based On Regex 09 min
        • Lecture10.9
          [Bonus] – Stealing Login Info Using Fake Login Prompt 07 min
        • Lecture10.10
          [Bonus] – Hacking Windows 10 Using A Fake Update 05 min
      • Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks 14

        • Lecture11.1
          Introduction to MITM Scripts? 06 min
        • Lecture11.2
          Capturing & Printing Requests/Responses 08 min
        • Lecture11.3
          Filtering Flows & Extracting Useful Data 09 min
        • Lecture11.4
          Using Conditions To Execute Code On Useful Flows 10 min
        • Lecture11.5
          Generating Custom HTTP Responses 08 min
        • Lecture11.6
          Testing Script Locally 08 min
        • Lecture11.7
          Generating Trojans – Installing The Trojan Factory 06 min
        • Lecture11.8
          Generating Trojans – Converting Any File (eg:image) To a Trojan 10 min
        • Lecture11.9
          Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 07 min
        • Lecture11.10
          Executing Bash Commands & Calling Trojan Factory From Our Script 09 min
        • Lecture11.11
          Using Variables & More Complex Conditions 09 min
        • Lecture11.12
          Converting Downloads To Trojans On The Fly 10 min
        • Lecture11.13
          Configuring The Trojan Factory’s MITMproxy Script 07 min
        • Lecture11.14
          Using The Trojan Factory MITMproxy Script 08 min
      • Post-Connection Attacks - Doing All Of The Above On HTTPS Websites 4

        • Lecture12.1
          Bypassing HTTPS With MITMproxy 06 min
        • Lecture12.2
          Replacing Downloads From HTTPS 05 min
        • Lecture12.3
          Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites 06 min
        • Lecture12.4
          Securing Systems From The Above Post Connection Attacks 06 min
      • Bonus Section 1

        • Lecture13.1
          Bonus Lecture – What’s Next?
        This content is protected, please login and enroll course to view this content!
        Prev Cracking WPA/WPA2 Much Faster Using GPU – Part 1
        Next What is It & How it Works

        “Everything related to ethical hacking

        & cyber security in one place.”

        Quick Links

        • Home
        • About Us
        • Hacking & Security
        • Contact
        • FAQ

        Services

        • Penetration Testing
        • Consulting
        • Code Review
        • One on one training
        • VPN
        • VIP Membership

        Company

        • About Us
        • Contact

        Support

        • FAQ
        • Forums

        Copyright © 2021 zSecurity Ltd. All rights reserved.

        • Privacy
        • Terms

        Contribute

        Share your knowledge with the world

        SUBMIT AN ARTICLE

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account

        Are you a member? Login now