- Introduction 2
- Teaser – Converting Downloads To Trojans On The Fly & Hacking Windows 10Lecture1.1
- Course OverviewLecture1.2
- Back To Basics/Pre-Connection Attacks 7
- Pre-connection Attacks OverviewLecture2.102 min
- Spoofing Mac Address ManuallyLecture2.203 min
- Targeting 5 GHz NetworksLecture2.307 min
- Deauthenticating a Client From Protected WiFi NetworksLecture2.407 min
- Deauthenticating Multiple Clients From Protected WiFi NetworksLecture2.508 min
- Deauthenticating All Clients From Protected WiFi NetworkLecture2.606 min
- Deauthenticating Same Client From Multiple Bands or NetworksLecture2.709 min
- Gaining Access 6
- Gaining Access OverviewLecture3.1
- Discovering Names of Hidden NetworksLecture3.208 min
- Connecting To Hidden NetworksLecture3.305 min
- Bypassing Mac Filtering (Blacklists & Whitelists)Lecture3.409 min
- Cracking SKA WEP NetworksLecture3.509 min
- Securing Systems From The Above AttacksLecture3.603 min
- Gaining Access - Captive Portals 13
- Sniffing Captive Portal Login Information In Monitor ModeLecture4.1
- Sniffing Captive Portal Login Information Using ARP SpoofingLecture4.209 min
- Creating a Fake Captive Portal – IntroductionLecture4.304 min
- Creating Login Page – Cloning a Login PageLecture4.407 min
- Creating Login Page – Fixing Relative LinksLecture4.507 min
- Creating Login Page – Adding Form TagLecture4.608 min
- Creating Login Page – Adding Submit ButtonLecture4.707 min
- Preparing Computer To Run Fake Captive PortalLecture4.808 min
- Starting The Fake Captive PortalLecture4.912 min
- Redirecting Requests To Captive Portal Login PageLecture4.1012 min
- Generating Fake SSL CertificateLecture4.1106 min
- Enabling SSL/HTTPS On WebserverLecture4.1208 min
- Sniffing & Analysing Login CredentialsLecture4.1306 min
- Gaining Access - WPA/WPA2 Cracking - Exploiting WPS 5
- Exploiting WPS – IntroductionLecture5.1
- Bypassing “Failed to associate” IssueLecture5.208 min
- Bypassing 0x3 and 0x4 ErrorsLecture5.308 min
- WPS Lock – What Is It & How To Bypass ItLecture5.407 min
- Unlocking WPSLecture5.509 min
- Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack 6
- Advanced Wordlist Attacks – IntroductionLecture6.1
- Saving Aircrack-ng Cracking ProgressLecture6.210 min
- Using Huge Wordlists With Aircrack-ng Without Wasting StorageLecture6.307 min
- Saving Cracking Progress When Using Huge Wordlists Without Wasting StorageLecture6.410 min
- Cracking WPA/WPA2 Much Faster Using GPU – Part 1Lecture6.507 min
- Cracking WPA/WPA2 Much Faster Using GPU – Part 2Lecture6.610 min
- Gaining Access - WPA/WPA Cracking - Evil Twin Attack 4
- What is It & How it WorksLecture7.1
- Installing Needed SoftwareLecture7.207 min
- Stealing WPA/WPA2 Key Using Evil Twin Attack Without GuessingLecture7.309 min
- Debugging & Fixing Login InterfaceLecture7.412 min
- Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise 5
- What is WPA/WPA2 Enterprise & How it WorksLecture8.1
- 2 Methods To Hack WPA & WPA2 EnterpriseLecture8.207 min
- Stealing Login CredentialsLecture8.308 min
- Cracking Login CredentialsLecture8.406 min
- Securing Systems From The Above Gaining Access AttacksLecture8.505 min
- Post Connection Attacks 7
- Post Connection Attacks OverviewLecture9.1
- Ettercap – Basic OverviewLecture9.207 min
- Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & PasswordsLecture9.310 min
- Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS WebsitesLecture9.413 min
- Automatically ARP Poisoning New ClientsLecture9.506 min
- DNS Spoofing Using EttercapLecture9.605 min
- Bypassing Router-Side Security & Poisoning Target Without Triggering AlarmsLecture9.709 min
- Post Connection Attacks - Analyzing Data Flows & Running Custom Attacks 10
- Introduction to MITMproxyLecture10.104 min
- Using MITMproxy In Explicit ModeLecture10.207 min
- Analysing (Filtering & Highlighting) FlowsLecture10.305 min
- Intercepting Network FlowsLecture10.405 min
- Modifying Responses & Injecting Javascript ManuallyLecture10.509 min
- Intercepting & Modifying Responses In Transparent ModeLecture10.607 min
- Editing Responses & Injecting BeEF’s Code On The FlyLecture10.709 min
- Editing Responses Automatically Based On RegexLecture10.809 min
- [Bonus] – Stealing Login Info Using Fake Login PromptLecture10.907 min
- [Bonus] – Hacking Windows 10 Using A Fake UpdateLecture10.1005 min
- Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks 14
- Introduction to MITM Scripts?Lecture11.106 min
- Capturing & Printing Requests/ResponsesLecture11.208 min
- Filtering Flows & Extracting Useful DataLecture11.309 min
- Using Conditions To Execute Code On Useful FlowsLecture11.410 min
- Generating Custom HTTP ResponsesLecture11.508 min
- Testing Script LocallyLecture11.608 min
- Generating Trojans – Installing The Trojan FactoryLecture11.706 min
- Generating Trojans – Converting Any File (eg:image) To a TrojanLecture11.810 min
- Testing Script On Remote Computer To Replace Downloads With a Generic TrojanLecture11.907 min
- Executing Bash Commands & Calling Trojan Factory From Our ScriptLecture11.1009 min
- Using Variables & More Complex ConditionsLecture11.1109 min
- Converting Downloads To Trojans On The FlyLecture11.1210 min
- Configuring The Trojan Factory’s MITMproxy ScriptLecture11.1307 min
- Using The Trojan Factory MITMproxy ScriptLecture11.1408 min
- Post-Connection Attacks - Doing All Of The Above On HTTPS Websites 4
- Bypassing HTTPS With MITMproxyLecture12.106 min
- Replacing Downloads From HTTPSLecture12.205 min
- Injecting Data (Javascript, HTML elements …etc) In HTTPS WebsitesLecture12.306 min
- Securing Systems From The Above Post Connection AttacksLecture12.406 min
- Bonus Section 1
- Bonus Lecture – What’s Next?Lecture13.1
Teaser – Converting Downloads To Trojans On The Fly & Hacking Windows 10
Course Overview
Next 