-
Introduction 2
-
Teaser – Converting Downloads To Trojans On The Fly & Hacking Windows 10Lecture1.1
-
Course OverviewLecture1.2
-
-
Back To Basics/Pre-Connection Attacks 7
-
Pre-connection Attacks OverviewLecture2.102 min
-
Spoofing Mac Address ManuallyLecture2.203 min
-
Targeting 5 GHz NetworksLecture2.307 min
-
Deauthenticating a Client From Protected WiFi NetworksLecture2.407 min
-
Deauthenticating Multiple Clients From Protected WiFi NetworksLecture2.508 min
-
Deauthenticating All Clients From Protected WiFi NetworkLecture2.606 min
-
Deauthenticating Same Client From Multiple Bands or NetworksLecture2.709 min
-
-
Gaining Access 6
-
Gaining Access OverviewLecture3.1
-
Discovering Names of Hidden NetworksLecture3.208 min
-
Connecting To Hidden NetworksLecture3.305 min
-
Bypassing Mac Filtering (Blacklists & Whitelists)Lecture3.409 min
-
Cracking SKA WEP NetworksLecture3.509 min
-
Securing Systems From The Above AttacksLecture3.603 min
-
-
Gaining Access - Captive Portals 13
-
Sniffing Captive Portal Login Information In Monitor ModeLecture4.1
-
Sniffing Captive Portal Login Information Using ARP SpoofingLecture4.209 min
-
Creating a Fake Captive Portal – IntroductionLecture4.304 min
-
Creating Login Page – Cloning a Login PageLecture4.407 min
-
Creating Login Page – Fixing Relative LinksLecture4.507 min
-
Creating Login Page – Adding Form TagLecture4.608 min
-
Creating Login Page – Adding Submit ButtonLecture4.707 min
-
Preparing Computer To Run Fake Captive PortalLecture4.808 min
-
Starting The Fake Captive PortalLecture4.912 min
-
Redirecting Requests To Captive Portal Login PageLecture4.1012 min
-
Generating Fake SSL CertificateLecture4.1106 min
-
Enabling SSL/HTTPS On WebserverLecture4.1208 min
-
Sniffing & Analysing Login CredentialsLecture4.1306 min
-
-
Gaining Access - WPA/WPA2 Cracking - Exploiting WPS 5
-
Exploiting WPS – IntroductionLecture5.1
-
Bypassing “Failed to associate” IssueLecture5.208 min
-
Bypassing 0x3 and 0x4 ErrorsLecture5.308 min
-
WPS Lock – What Is It & How To Bypass ItLecture5.407 min
-
Unlocking WPSLecture5.509 min
-
-
Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack 6
-
Advanced Wordlist Attacks – IntroductionLecture6.1
-
Saving Aircrack-ng Cracking ProgressLecture6.210 min
-
Using Huge Wordlists With Aircrack-ng Without Wasting StorageLecture6.307 min
-
Saving Cracking Progress When Using Huge Wordlists Without Wasting StorageLecture6.410 min
-
Cracking WPA/WPA2 Much Faster Using GPU – Part 1Lecture6.507 min
-
Cracking WPA/WPA2 Much Faster Using GPU – Part 2Lecture6.610 min
-
-
Gaining Access - WPA/WPA Cracking - Evil Twin Attack 4
-
What is It & How it WorksLecture7.1
-
Installing Needed SoftwareLecture7.207 min
-
Stealing WPA/WPA2 Key Using Evil Twin Attack Without GuessingLecture7.309 min
-
Debugging & Fixing Login InterfaceLecture7.412 min
-
-
Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise 5
-
What is WPA/WPA2 Enterprise & How it WorksLecture8.1
-
2 Methods To Hack WPA & WPA2 EnterpriseLecture8.207 min
-
Stealing Login CredentialsLecture8.308 min
-
Cracking Login CredentialsLecture8.406 min
-
Securing Systems From The Above Gaining Access AttacksLecture8.505 min
-
-
Post Connection Attacks 7
-
Post Connection Attacks OverviewLecture9.1
-
Ettercap – Basic OverviewLecture9.207 min
-
Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & PasswordsLecture9.310 min
-
Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS WebsitesLecture9.413 min
-
Automatically ARP Poisoning New ClientsLecture9.506 min
-
DNS Spoofing Using EttercapLecture9.605 min
-
Bypassing Router-Side Security & Poisoning Target Without Triggering AlarmsLecture9.709 min
-
-
Post Connection Attacks - Analyzing Data Flows & Running Custom Attacks 10
-
Introduction to MITMproxyLecture10.104 min
-
Using MITMproxy In Explicit ModeLecture10.207 min
-
Analysing (Filtering & Highlighting) FlowsLecture10.305 min
-
Intercepting Network FlowsLecture10.405 min
-
Modifying Responses & Injecting Javascript ManuallyLecture10.509 min
-
Intercepting & Modifying Responses In Transparent ModeLecture10.607 min
-
Editing Responses & Injecting BeEF’s Code On The FlyLecture10.709 min
-
Editing Responses Automatically Based On RegexLecture10.809 min
-
[Bonus] – Stealing Login Info Using Fake Login PromptLecture10.907 min
-
[Bonus] – Hacking Windows 10 Using A Fake UpdateLecture10.1005 min
-
-
Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks 14
-
Introduction to MITM Scripts?Lecture11.106 min
-
Capturing & Printing Requests/ResponsesLecture11.208 min
-
Filtering Flows & Extracting Useful DataLecture11.309 min
-
Using Conditions To Execute Code On Useful FlowsLecture11.410 min
-
Generating Custom HTTP ResponsesLecture11.508 min
-
Testing Script LocallyLecture11.608 min
-
Generating Trojans – Installing The Trojan FactoryLecture11.706 min
-
Generating Trojans – Converting Any File (eg:image) To a TrojanLecture11.810 min
-
Testing Script On Remote Computer To Replace Downloads With a Generic TrojanLecture11.907 min
-
Executing Bash Commands & Calling Trojan Factory From Our ScriptLecture11.1009 min
-
Using Variables & More Complex ConditionsLecture11.1109 min
-
Converting Downloads To Trojans On The FlyLecture11.1210 min
-
Configuring The Trojan Factory’s MITMproxy ScriptLecture11.1307 min
-
Using The Trojan Factory MITMproxy ScriptLecture11.1408 min
-
-
Post-Connection Attacks - Doing All Of The Above On HTTPS Websites 4
-
Bypassing HTTPS With MITMproxyLecture12.106 min
-
Replacing Downloads From HTTPSLecture12.205 min
-
Injecting Data (Javascript, HTML elements …etc) In HTTPS WebsitesLecture12.306 min
-
Securing Systems From The Above Post Connection AttacksLecture12.406 min
-
-
Bonus Section 1
-
Bonus Lecture – What’s Next?Lecture13.1
-
This content is protected, please login and enroll course to view this content!
