Course Highlights
  • 80+ detailed videos (10 hours) on ADVANCED network hacking
  • 2 methods to hack WPA2 enterprise networks
  • 3 methods to hack captive portals (hotels & airport networks)
  • Steal WPA/WPA2 password using evil twin attack.
  • Crack WPA/WPA2 faster using GPU.
  • Write custom scripts to implement your attack ideas.
  • Bypass router-side security & run ARP spoofing attack without raising alarms.
  • Unlock WPS on some routers even if its locked
  • Disconnect multiple or all clients from their networks without knowing the key
  • Bypass MAC filtering (both black & white lists).
  • Discover & connect to hidden networks
  • Crack more secure WEP implementation when SKA is used.
  • Exploit WPS on more secure routers to get the WPA/WPA2 key.
  • Understand how WPA/WPA2 enterprise work.
  • Understand how a fake access points work
  • Manually create fake access points
  • Generate SSL certificates & use it to support HTTPS on apache2.
  • Create a fake captive portal that acts exactly like a normal captive portal.
  • Use huge wordlists to crack WPA/WPA2 without taking up disk space.
  • Save WPA / WPA2 cracking progress.
  • Bypass HTTPS & capture data manually.
  • Analyse data flows and build own attacks.
  • Run attacks against HTTPS websites.
  • Inject Javascript / HTML code in HTTPS pages.
  • Create trojans - combine any file (image/pdf) with malware.
  • Replace files downloaded on the network with trojans.
  • Write script to replace downloads with trojans on the fly.
Curriculum

2 Topics
Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10
Course Overview

7 Topics
Pre-connection Attacks Overview
Spoofing Mac Address Manually
Hacking 5 GHz Networks
Deauthenticating a Client From Protected WiFi Networks
Deauthenticating Multiple Clients From Protected WiFi Networks
Deauthenticating All Clients From Protected WiFi Network
Deauthenticating Same Client From Multiple Bands or Networks

6 Topics
Gaining Access Overview
Discovering Hidden Networks
Connecting To Hidden Networks
Bypassing Mac Filtering (Blacklists & Whitelists)
Cracking SKA WEP Networks
Securing Systems From The Above Attacks

13 Topics
Sniffing Captive Portal Login Information In Monitor Mode
Sniffing Captive Portal Login Information Using ARP Spoofing
Creating a Fake Captive Portal - Introduction
Creating Login Page - Cloning a Login Page
Creating Login Page - Fixing Relative Links
Creating Login Page - Adding Form Tag
Creating Login Page - Adding Submit Button
Preparing Computer To Run Fake Captive Portal
Starting The Fake Captive Portal
Redirecting Requests To Captive Portal Login Page
Generating Fake SSL Certificate
Enabling SSL/HTTPS On Webserver
Sniffing & Analysing Login Credentials

5 Topics
Exploiting WPS - Introduction
Bypassing "Failed to associate" Issue
Bypassing 0x3 and 0x4 Errors
WPS Lock - What Is It & How To Bypass It
Unlocking WPS

6 Topics
Advanced Wordlist Attacks - Introduction
Saving Cracking Progress
Using Huge Wordlists Without Wasting Storage
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
Cracking WPA/WPA2 Much Faster Using GPU - Part 1
Cracking WPA/WPA2 Much Faster Using GPU - Part 2

4 Topics
How the Evil Twin attack Work?
Installing Needed Software
Stealing WPA & WPA2 Key Using Evil Twin Attack Without Guessing
Debugging & Fixing Login Interface Issues

5 Topics
What is WPA & WPA2 Enterprise & How it Works
2 Methods To Hack WPA & WPA2 Enterprise
Stealing Login Credentials
Cracking Login Credentials
Securing Systems From The Above Attacks

6 Topics
Post Connection Attacks Overview
Ettercap - Basic Overview
Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords
Automatically ARP Poisoning New Clients
DNS Spoofing Using Ettercap
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms

10 Topics
Introduction to MITMproxy
Using MITMproxy In Explicit Mode
Analysing (Filtering & Highlighting) Flows
Intercepting Network Flows
Modifying Responses & Injecting Javascript Manually
Intercepting & Modifying Responses In Transparent Mode
Editing Responses & Injecting BeEF's Code On The Fly
Editing Responses Automatically Based On Regex
[Bonus] - Stealing Login Info Using Fake Login Prompt
[Bonus] - Hacking Windows 10 Using A Fake Update

14 Topics
Introduction to MITM Scripts?
Capturing & Printing Requests/Responses
Filtering Flows & Extracting Useful Data
Using Conditions To Execute Code On Useful Flows
Generating Custom HTTP Responses
Testing Script Locally
Generating Trojans - Installing The Trojan Factory
Generating Trojans - Converting Any File (eg:image) To a Trojan
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan
Executing Bash Commands & Calling Trojan Factory From Our Script
Using Variables & More Complex Conditions
Converting Downloads To Trojans On The Fly
Configuring The Trojan Factory's MITMproxy Script
Using The Trojan Factory MITMproxy Script

4 Topics
Bypassing HTTPS With MITMproxy
Replacing HTTPS Downloads
Injecting Data (Javascript HTML elements ...etc) In HTTPS Websites
Securing Systems From The Above Post Connection Attacks

1 Topic
Bonus Lecture - Discounts

  Write a Review

Network Hacking Continued - Intermediate to Advanced

Go to Paid Course