Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Network Penetration Tester - Pentesting Real Time Cyber Attacks
01 INTRODUCTION
1.Teaser - Converting Downloads To Trojans On The Fly Hacking Windows 10 (6:41)
2.Course Overview (5:24)
02 BACK TO BASICS PRE-CONNECTION ATTACKS
1.Pre-connection Attacks Overview (1:54)
2.Spoofing Mac Address Manually (3:24)
3.Targeting 5 GHz Networks (6:43)
4.Deauthenticating a Client From Protected WiFi Networks (6:54)
5.Deauthenticating Multiple Clients From Protected WiFi Networks (7:50)
6.Deauthenticating All Clients From Protected WiFi Network (6:04)
Pre-Connection-Attacks
03 GAINING ACCESS
1.Gaining Access Overview (2:29)
1.1.Gaining-Access
2.Discovering Names of Hidden Networks (8:11)
3.Connecting To Hidden Networks (5:14)
4.Bypassing Mac Filtering _Blacklists Whitelists (9:04)
5.Cracking SKA WEP Networks (9:05)
6.Securing Systems From The Above Attacks (3:17)
6.1.Security-1
04 GAINING ACCESS - CAPTIVE PORTALS
1.Sniffing Captive Portal Login Information In Monitor Mode (9:59)
1.1.Gaining-Access-Captive-Portals
2.Sniffing Captive Portal Login Information Using ARP Spoofing (8:55)
3.Creating a Fake Captive Portal - Introduction (4:18)
4.Creating Login Page - Cloning a Login Page (7:17)
5.Creating Login Page - Fixing Relative Links (6:53)
6.Creating Login Page - Adding Form Tag (7:44)
7.Creating Login Page - Adding Submit Button (6:44)
8.Preparing Computer To Run Fake Captive Portal (7:57)
9.Starting The Fake Captive Portal (11:57)
10.Redirecting Requests To Captive Portal Login Page (12:19)
11.Generating Fake SSL Certificate (5:54)
12.Enabling SSLHTTPS On Webserver (7:50)
13.Sniffing Analysing Login Credentials (6:03)
05 GAINING ACCESS - WPAWPA2 CRACKING - EXPLOITING WPS
1.Exploiting WPS - Introduction (1:34)
2.Bypassing Failed to associate Issue (7:39)
3.Bypassing 0x3 and 0x4 Errors (7:39)
4.WPS Lock - What Is It How To Bypass It (7:01)
5.Unlocking WPS (8:40)
06 GAINING ACCESS - WPAWPA2 CRACKING - ADVANCED WORDLIST ATTACK
1.Advanced Wordlist Attacks - Introduction (1:39)
1.1.Gaining-Access-Advanced-Wordlist-Attacks
2.Saving Aircrack-ng Cracking Progress (9:44)
3.Using Huge Wordlists With Aircrack-ng Without Wasting Storage (7:35)
4.Cracking WPAWPA2 Much Faster Using GPU - Part 1 (7:19)
5.Cracking WPAWPA2 Much Faster Using GPU - Part 2 (10:39)
07 GAINING ACCESS - WPAWPA CRACKING - EVIL TWIN ATTACK
1.What is It How it Works (7:21)
1.1.Gaining-Access-Evil-Twin
2.Installing Needed Software (7:39)
3.Stealing WPAWPA2 Key Using Evil Twin Attack Without Guessing (9:38)
4.Debugging Fixing Login Interface (11:51)
08 GAINING ACCESS - WPAWPA2 CRACKING - WPAWPA2 ENTERPRISE
1.What is WPAWPA2 Enterprise How it Works (5:24)
1.1.Gaining-Access-WPA-2FWPA2-Enterprise
2.How To Hack WPAWPA2 Enterprise (6:47)
3.Stealing Login Credentials (8:11)
4.Cracking Login Credentials (6:38)
5.Securing Systems From The Above Gaining Access Attacks (4:59)
5.1.Security-2
09 POST CONNECTION ATTACKS
1.Post Connection Attacks Overview (4:22)
1.1.Post-Connection
2.Ettercap - Basic Overview (7:09)
3.Ettercap - ARP Spoofing Sniffing Sensitive Data Such As Usernames Passwords (9:51)
4.Setting Up SSLstrip Manually To Bypass HTTPS Sniff Data From HTTPS Websites (12:44)
5.Automatically ARP Poisoning New Clients (6:53)
6.DNS Spoofing Using Ettercap (5:30)
7.Bypassing Router-Side Security Poisoning Target Without Triggering Alarms (9:17)
10 POST CONNECTION ATTACKS - ANALYSING DATA FLOWS RUNNING CUSTOM ATTACKS
1.MITMproxy - What is It How To Install It (3:47)
1.1.Post-Connection-Analysing-Data-Flows
2.Using MITMproxy In Explicit Mode (7:12)
3.Analysing _Filtering Highlighting_ Flows (5:13)
4.Intercepting Network Flows (4:51)
5.Modifying Responses Injecting Javascript Manually (8:45)
6.Intercepting Modifying Responses In Transparent Mode (7:31)
7.Editing Responses Injecting BeEFs Code On The Fly (9:16)
8.Editing Responses Automatically Based On Regex (9:13)
9.Bonus - Stealing Login Info Using Fake Login Prompt (7:12)
10.Bonus - Hacking Windows 10 Using A Fake Update (4:41)
11 POST CONNECTION ATTACKS - WRITING CUSTOM SCRIPTS TO EXECUTE OWN ATTACKS
1.What Do Mean By MITM Scripts (6:14)
1.1.Post-Connection-Writing-Custom-Scripts
2.Capturing Printing RequestsResponses (8:30)
3.Filtering Flows Extracting Useful Data (9:25)
4.Using Conditions To Execute Code On Useful Flows (9:48)
5.Generating Custom HTTP Responses (8:35)
6.Testing Script Locally (8:29)
7.Generating Trojans - Installing The Trojan Factory (6:16)
8.Generating Trojans - Converting Any File _egimage_ To a Trojan (10:15)
9.Using Variables More Complex Conditions (8:42)
10.Converting Downloads To Trojans On The Fly (10:10)
11.Configuring The Trojan Factorys MITMproxy Script (7:32)
12.Using The Trojan Factory MITMproxy Script (7:48)
12 POST-CONNECTION ATTACKS - DOING ALL OF THE ABOVE ON HTTPS WEBSITES
1.Bypassing HTTPS With MITMproxy (6:11)
2.Replacing Downloads From HTTPS (5:12)
3.Securing Systems From The Above Post Connection Attacks (5:40)
Teach online with
4.Bypassing Mac Filtering _Blacklists Whitelists
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock