• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Network Hacking Continued - Intermediate to Advanced

Network Hacking Continued - Intermediate to Advanced

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 10 hours 2 minutes

  • All levels

Description

Want to know the secrets to network hacking? Do you dream of becoming the ultimate script kiddie? If you want to become an ethical hacker, this advanced computer hacking course will teach you how to break into computer systems and networks to gain access to Wi-Fi passwords and much more.

This network hacking course will train you how to identify and exploit weaknesses in computer systems and networks, helping you to outsmart computer security and gain unauthorized access to a computer's system. You'll learn essential password cracking techniques and how to create Trojan horse viruses and other malicious codes. You'll also familiarise with hacking operating systems and different types of attacks. Additionally, you'll be trained on how to run attacks on HTTPS websites and write your own Python scripts to implement custom MITM attacks.

This advanced network hacking course is ideal for students who are already familiar with the basics of network hacking. Topics include captive portals, WEP cracking, WPA/WPA2 cracking, evil twin attacks and post-connection attacks,

What you'll learn
  • Learn how to write custom scripts to gather important hacking information

  • Discover the secrets of how to unlock WPS on routers, even if they're locked

  • Understand how wireless phishing works and how to create fake captive portals

  • Uncover the names of hidden networks and discover how to connect to them

  • Learn how to replace downloaded files from a network with trojans

  • Discover how to create trojans and combine any file in any format with an evil file

  • Familiarise with common types of cybersecurity attacks and hacking techniques

  • Understand how to exploit the WPS feature and hack Wi-Fi passwords

Requirements
  • Computer with a minimum of 4GB ram/memory

  • Operating System: Windows / OS X / Linux

  • Finished the networks section of my general ethical hacking course OR

  • Finished my network hacking course.

  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).

Who this course is for:
  • People who want to take their network hacking skills to the next level.

  • People who want to have a better understanding of the subject and enhance their skills.

  • People who want to be able to run attacks manually & write their own MITM scripts.

Introduction

Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam

FREE

00:07:00

Course Overview

FREE

00:05:00

Back To Basics/Pre-Connection Attacks

Pre-connection Attacks Overview

00:02:00

Spoofing Mac Address Manually

00:03:00

Targeting 5 GHz Networks

00:07:00

Deauthenticating a Client From Protected WiFi Networks

00:07:00

Deauthenticating Multiple Clients From Protected WiFi Networks

00:08:00

Deauthenticating All Clients From Protected WiFi Network

00:06:00

Gaining Access

Gaining Access Overview

00:02:00

Discovering Names of Hidden Networks

00:08:00

Connecting To Hidden Networks

00:05:00

Bypassing Mac Filtering (Blacklists & Whitelists)

00:09:00

Cracking SKA WEP Network

00:09:00

Securing Systems From The Above Attacks

00:03:00

Gaining Access - Captive Portals

Sniffing Captive Portal Login Information In Monitor Mode

00:10:00

Sniffing Captive Portal Login Information Using ARP Spoofing

00:09:00

Creating a Fake Captive Portal - Introduction

00:04:00

Creating Login Page - Cloning a Login Page

00:07:00

Creating Login Page - Fixing Relative Links

00:07:00

Creating Login Page - Adding Form Tag

00:08:00

Creating Login Page - Adding Submit Button

00:07:00

Preparing Computer To Run Fake Captive Portal

00:08:00

Starting The Fake Captive Portal

00:12:00

Redirecting Requests To Captive Portal Login Page

00:12:00

Generating Fake SSL Certificate

00:06:00

Enabling SSL/HTTPS On Webserver

00:08:00

Sniffing & Analysing Login Credentials

00:06:00

Gaining Access - WPA/WPA2 Cracking - Exploiting WPS

Exploiting WPS - Introduction

00:02:00

Bypassing 'Failed to associate' Issue

00:08:00

Bypassing 0x3 and 0x4 Errors

00:08:00

WPS Lock - What Is It & How To Bypass It

00:07:00

Unlocking WPS

00:09:00

Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack

Advanced Wordlist Attacks - Introduction

00:02:00

Saving Aircrack-ng Cracking Progress

00:10:00

Using Huge Wordlists With Aircrack-ng Without Wasting Storage

00:08:00

Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage

00:10:00

Cracking WPA/WPA2 Much Faster Using GPU - Part 1

00:07:00

Cracking WPA/WPA2 Much Faster Using GPU - Part 2

00:11:00

Gaining Access - WPA/WPA Cracking - Evil Twin Attack

What is It & How it Works

00:07:00

Installing Needed Software

00:08:00

Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing

00:10:00

Debugging & Fixing Login Interface

00:12:00

Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise

What is WPA/WPA2 Enterprise & How it Works

00:05:00

How To Hack WPA/WPA2 Enterprise

00:07:00

Stealing Login Credentials

00:08:00

Cracking Login Credentials

00:07:00

Securing Systems From The Above Gaining Access Attacks

00:05:00

Post Connection Attacks

Post Connection Attacks Overview

00:04:00

Ettercap - Basic Overview

00:07:00

Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords

00:10:00

Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites

00:13:00

Automatically ARP Poisoning New Clients

00:07:00

DNS Spoofing Using Ettercap

00:06:00

Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms

00:09:00

Post Connection Attacks - Analysing Data Flows & Running Custom Attacks

MITMproxy - What is It & How To Install It

00:04:00

Using MITMproxy In Explicit Mode

00:07:00

Analysing (Filtering & Highlighting) Flows

00:05:00

Intercepting Network Flows

00:05:00

Modifying Responses & Injecting Javascript Manually

00:09:00

Intercepting & Modifying Responses In Transparent Mode

00:08:00

Editing Responses & Injecting BeEF's Code On The Fly

00:09:00

Editing Responses Automatically Based On Regex

00:09:00

Stealing Login Info Using Fake Login Promo

00:07:00

[Bonus] - Hacking Windows 10 Using A Fake Update

00:05:00

Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks

What Do Mean By MITM Scripts?

00:06:00

Capturing & Printing Requests/Responses

00:09:00

Filtering Flows & Extracting Useful Data

00:09:00

Using Conditions To Execute Code On Useful Flows

00:10:00

Generating Custom HTTP Responses

00:09:00

Testing Script Locally

00:09:00

Generating Trojans - Installing The Trojan Factory

00:06:00

Generating Trojans - Converting Any File (eg: mage) To a Trojan

00:10:00

Testing Script On Remote Computer To Replace Downloads With a Generic Trojan

00:07:00

Executing Bash Commands & Calling Trojan Factory From Our Script

00:09:00

Using Variables & More Complex Conditions

00:09:00

Converting Downloads To Trojans On The Fly

00:10:00

Configuring The Trojan Factory's MITMproxy Script

00:08:00

Using The Trojan Factory MITMproxy Script

00:08:00

Post-Connection Attacks - Doing All Of The Above On HTTPS Websites

Bypassing HTTPS With MITMproxy

00:06:00

Replacing Downloads From HTTPS

00:05:00

Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites

00:06:00

Securing Systems From The Above Post Connection Attacks

00:06:00

About The Provider

We understand more than anyone how important it is for yo...

Read more about iStudy UK

Tags

Reviews