Section 1 : Introduction
|
Lecture 1 | Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10 | 00:06:42 Duration |
|
Lecture 2 | Course Overview | 00:05:25 Duration |
Section 2 : Back To BasicsPre-Connection Attacks
|
Lecture 1 | Pre-connection Attacks Overview | |
|
Lecture 2 | Spoofing Mac Address Manually | 00:03:24 Duration |
|
Lecture 3 | Targeting 5 GHz Networks | 00:06:44 Duration |
|
Lecture 4 | Deauthenticating a Client From Protected WiFi Networks | 00:06:55 Duration |
|
Lecture 5 | Deauthenticating Multiple Clients From Protected WiFi Networks | 00:07:51 Duration |
|
Lecture 6 | Deauthenticating All Clients From Protected WiFi Network | 00:06:05 Duration |
|
Lecture 7 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM |
Section 3 : Gaining Access
|
Lecture 1 | Gaining Access Overview | 00:02:29 Duration |
|
Lecture 2 | Discovering Hidden Networks | 00:08:12 Duration |
|
Lecture 3 | Connecting To Hidden Networks | 00:05:14 Duration |
|
Lecture 4 | Bypassing Mac Filtering (Blacklists & Whitelists) | 00:09:04 Duration |
|
Lecture 5 | Cracking SKA WEP Networks | 00:09:05 Duration |
|
Lecture 6 | Securing Systems From The Above Attacks | 00:03:18 Duration |
Section 4 : Gaining Access - Captive Portals
|
Lecture 1 | Sniffing Captive Portal Login Information In Monitor Mode | 00:09:59 Duration |
|
Lecture 2 | Sniffing Captive Portal Login Information Using ARP Spoofing | 00:08:55 Duration |
|
Lecture 3 | Creating a Fake Captive Portal - Introduction | 00:04:19 Duration |
|
Lecture 4 | Creating Login Page - Cloning a Login Page | 00:07:17 Duration |
|
Lecture 5 | Creating Login Page - Fixing Relative Links | 00:06:54 Duration |
|
Lecture 6 | Creating Login Page - Adding Form Tag | 00:07:44 Duration |
|
Lecture 7 | Creating Login Page - Adding Submit Button | 00:06:45 Duration |
|
Lecture 8 | Preparing Computer To Run Fake Captive Portal | 00:07:57 Duration |
|
Lecture 9 | Starting The Fake Captive Portal | 00:11:58 Duration |
|
Lecture 10 | Redirecting Requests To Captive Portal Login Page | |
|
Lecture 11 | Generating Fake SSL Certificate | 00:05:54 Duration |
|
Lecture 12 | Enabling SSLHTTPS On Webserver | 00:07:50 Duration |
|
Lecture 13 | Sniffing & Analysing Login Credentials | 00:06:03 Duration |
Section 5 : Gaining Access - WPA & WPA2 Cracking - Exploiting WPS
|
Lecture 1 | Exploiting WPS - Introduction | 00:01:34 Duration |
|
Lecture 2 | Bypassing Failed to associate Issue | 00:07:40 Duration |
|
Lecture 3 | Bypassing 0x3 and 0x4 Errors | 00:07:40 Duration |
|
Lecture 4 | WPS Lock - What Is It & How To Bypass It | 00:07:02 Duration |
|
Lecture 5 | Unlocking WPS | 00:08:41 Duration |
Section 6 : Gaining Access - WPA & WPA2 Cracking - Advanced Wordlist Attack
|
Lecture 1 | Advanced Wordlist Attacks - Introduction | 00:01:39 Duration |
|
Lecture 2 | Saving Cracking Progress | 00:09:44 Duration |
|
Lecture 3 | Using Huge Wordlists Without Wasting Storage | 00:07:35 Duration |
|
Lecture 4 | Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage | 00:10:05 Duration |
|
Lecture 5 | Cracking WPAWPA2 Much Faster Using GPU - Part 1 | 00:07:20 Duration |
|
Lecture 6 | Cracking WPAWPA2 Much Faster Using GPU - Part 2 |
Section 7 : Gaining Access - WPA & WPA2 Cracking - Evil Twin Attack
|
Lecture 1 | What is It & How it Works | 00:07:22 Duration |
|
Lecture 2 | Installing Needed Software | 00:07:40 Duration |
|
Lecture 3 | Stealing WPA & WPA2 Key Using Evil Twin Attack Without Guessing | 00:09:38 Duration |
|
Lecture 4 | Debugging & Fixing Login Interface Issues | 00:11:52 Duration |
Section 8 : Gaining Access - WPA & WPA2 Cracking - WPAWPA2 Enterprise
|
Lecture 1 | What is WPA & WPA2 Enterprise & How it Works | 00:05:25 Duration |
|
Lecture 2 | 2 Methods To Hack WPA & WPA2 Enterprise | 00:06:48 Duration |
|
Lecture 3 | Stealing Login Credentials | 00:08:11 Duration |
|
Lecture 4 | Cracking Login Credentials | 00:06:38 Duration |
|
Lecture 5 | Securing Systems From The Above Attacks | 00:04:59 Duration |
Section 9 : Post Connection Attacks
|
Lecture 1 | Post Connection Attacks Overview | |
|
Lecture 2 | Ettercap - Basic Overview | 00:07:10 Duration |
|
Lecture 3 | Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords | 00:09:51 Duration |
|
Lecture 4 | Automatically ARP Poisoning New Clients | 00:06:53 Duration |
|
Lecture 5 | DNS Spoofing Using Ettercap | 00:05:30 Duration |
|
Lecture 6 | Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms | 00:09:18 Duration |
Section 10 : Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
|
Lecture 1 | Introduction to MITMproxy | 00:03:48 Duration |
|
Lecture 2 | Using MITMproxy In Explicit Mode | 00:07:13 Duration |
|
Lecture 3 | Analysing (Filtering & Highlighting) Flows | 00:05:13 Duration |
|
Lecture 4 | Intercepting Network Flows | 00:04:51 Duration |
|
Lecture 5 | Modifying Responses & Injecting Javascript Manually | 00:08:45 Duration |
|
Lecture 6 | Intercepting & Modifying Responses In Transparent Mode | 00:07:31 Duration |
|
Lecture 7 | Editing Responses & Injecting BeEF's Code On The Fly | 00:09:17 Duration |
|
Lecture 8 | Editing Responses Automatically Based On Regex | 00:09:13 Duration |
|
Lecture 9 | [Bonus] - Stealing Login Info Using Fake Login Prompt | 00:07:12 Duration |
|
Lecture 10 | [Bonus] - Hacking Windows 10 Using A Fake Update | 00:04:41 Duration |
Section 11 : Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
Section 12 : Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
|
Lecture 1 | Bypassing HTTPS With MITMproxy | 00:06:11 Duration |
|
Lecture 2 | Replacing HTTPS Downloads | 00:05:12 Duration |
|
Lecture 3 | Injecting Data (Javascript, HTML elements | 00:06:17 Duration |
|
Lecture 4 | Securing Systems From The Above Post Connection Attacks | 00:05:40 Duration |