Section 1 : Introduction

Lecture 1 Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10 00:06:42 Duration
Lecture 2 Course Overview 00:05:25 Duration

Section 2 : Back To BasicsPre-Connection Attacks

Lecture 1 Pre-connection Attacks Overview
Lecture 2 Spoofing Mac Address Manually 00:03:24 Duration
Lecture 3 Targeting 5 GHz Networks 00:06:44 Duration
Lecture 4 Deauthenticating a Client From Protected WiFi Networks 00:06:55 Duration
Lecture 5 Deauthenticating Multiple Clients From Protected WiFi Networks 00:07:51 Duration
Lecture 6 Deauthenticating All Clients From Protected WiFi Network 00:06:05 Duration
Lecture 7 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM

Section 3 : Gaining Access

Lecture 1 Gaining Access Overview 00:02:29 Duration
Lecture 2 Discovering Hidden Networks 00:08:12 Duration
Lecture 3 Connecting To Hidden Networks 00:05:14 Duration
Lecture 4 Bypassing Mac Filtering (Blacklists & Whitelists) 00:09:04 Duration
Lecture 5 Cracking SKA WEP Networks 00:09:05 Duration
Lecture 6 Securing Systems From The Above Attacks 00:03:18 Duration

Section 4 : Gaining Access - Captive Portals

Lecture 1 Sniffing Captive Portal Login Information In Monitor Mode 00:09:59 Duration
Lecture 2 Sniffing Captive Portal Login Information Using ARP Spoofing 00:08:55 Duration
Lecture 3 Creating a Fake Captive Portal - Introduction 00:04:19 Duration
Lecture 4 Creating Login Page - Cloning a Login Page 00:07:17 Duration
Lecture 5 Creating Login Page - Fixing Relative Links 00:06:54 Duration
Lecture 6 Creating Login Page - Adding Form Tag 00:07:44 Duration
Lecture 7 Creating Login Page - Adding Submit Button 00:06:45 Duration
Lecture 8 Preparing Computer To Run Fake Captive Portal 00:07:57 Duration
Lecture 9 Starting The Fake Captive Portal 00:11:58 Duration
Lecture 10 Redirecting Requests To Captive Portal Login Page
Lecture 11 Generating Fake SSL Certificate 00:05:54 Duration
Lecture 12 Enabling SSLHTTPS On Webserver 00:07:50 Duration
Lecture 13 Sniffing & Analysing Login Credentials 00:06:03 Duration

Section 5 : Gaining Access - WPA & WPA2 Cracking - Exploiting WPS

Lecture 1 Exploiting WPS - Introduction 00:01:34 Duration
Lecture 2 Bypassing Failed to associate Issue 00:07:40 Duration
Lecture 3 Bypassing 0x3 and 0x4 Errors 00:07:40 Duration
Lecture 4 WPS Lock - What Is It & How To Bypass It 00:07:02 Duration
Lecture 5 Unlocking WPS 00:08:41 Duration

Section 6 : Gaining Access - WPA & WPA2 Cracking - Advanced Wordlist Attack

Lecture 1 Advanced Wordlist Attacks - Introduction 00:01:39 Duration
Lecture 2 Saving Cracking Progress 00:09:44 Duration
Lecture 3 Using Huge Wordlists Without Wasting Storage 00:07:35 Duration
Lecture 4 Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 00:10:05 Duration
Lecture 5 Cracking WPAWPA2 Much Faster Using GPU - Part 1 00:07:20 Duration
Lecture 6 Cracking WPAWPA2 Much Faster Using GPU - Part 2

Section 7 : Gaining Access - WPA & WPA2 Cracking - Evil Twin Attack

Lecture 1 What is It & How it Works 00:07:22 Duration
Lecture 2 Installing Needed Software 00:07:40 Duration
Lecture 3 Stealing WPA & WPA2 Key Using Evil Twin Attack Without Guessing 00:09:38 Duration
Lecture 4 Debugging & Fixing Login Interface Issues 00:11:52 Duration

Section 8 : Gaining Access - WPA & WPA2 Cracking - WPAWPA2 Enterprise

Lecture 1 What is WPA & WPA2 Enterprise & How it Works 00:05:25 Duration
Lecture 2 2 Methods To Hack WPA & WPA2 Enterprise 00:06:48 Duration
Lecture 3 Stealing Login Credentials 00:08:11 Duration
Lecture 4 Cracking Login Credentials 00:06:38 Duration
Lecture 5 Securing Systems From The Above Attacks 00:04:59 Duration

Section 9 : Post Connection Attacks

Lecture 1 Post Connection Attacks Overview
Lecture 2 Ettercap - Basic Overview 00:07:10 Duration
Lecture 3 Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 00:09:51 Duration
Lecture 4 Automatically ARP Poisoning New Clients 00:06:53 Duration
Lecture 5 DNS Spoofing Using Ettercap 00:05:30 Duration
Lecture 6 Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 00:09:18 Duration

Section 10 : Post Connection Attacks - Analysing Data Flows & Running Custom Attacks

Lecture 1 Introduction to MITMproxy 00:03:48 Duration
Lecture 2 Using MITMproxy In Explicit Mode 00:07:13 Duration
Lecture 3 Analysing (Filtering & Highlighting) Flows 00:05:13 Duration
Lecture 4 Intercepting Network Flows 00:04:51 Duration
Lecture 5 Modifying Responses & Injecting Javascript Manually 00:08:45 Duration
Lecture 6 Intercepting & Modifying Responses In Transparent Mode 00:07:31 Duration
Lecture 7 Editing Responses & Injecting BeEF's Code On The Fly 00:09:17 Duration
Lecture 8 Editing Responses Automatically Based On Regex 00:09:13 Duration
Lecture 9 [Bonus] - Stealing Login Info Using Fake Login Prompt 00:07:12 Duration
Lecture 10 [Bonus] - Hacking Windows 10 Using A Fake Update 00:04:41 Duration

Section 11 : Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks

Lecture 1 Introduction to MITM Scripts 00:06:14 Duration
Lecture 2 Capturing & Printing RequestsResponses 00:08:31 Duration
Lecture 3 Filtering Flows & Extracting Useful Data 00:09:25 Duration
Lecture 4 Using Conditions To Execute Code On Useful Flows 00:09:49 Duration
Lecture 5 Generating Custom HTTP Responses 00:08:36 Duration
Lecture 6 Testing Script Locally 00:08:30 Duration
Lecture 7 Generating Trojans - Installing The Trojan Factory 00:06:17 Duration
Lecture 8 Generating Trojans - Converting Any File (egimage) To a Trojan 00:10:16 Duration
Lecture 9 Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 00:07:08 Duration
Lecture 10 Executing Bash Commands & Calling Trojan Factory From Our Script 00:08:48 Duration
Lecture 11 Using Variables & More Complex Conditions
Lecture 12 Converting Downloads To Trojans On The Fly 00:10:10 Duration
Lecture 13 Configuring The Trojan Factory's MITMproxy Script 00:07:33 Duration
Lecture 14 Using The Trojan Factory MITMproxy Script 00:07:49 Duration

Section 12 : Post-Connection Attacks - Doing All Of The Above On HTTPS Websites

Lecture 1 Bypassing HTTPS With MITMproxy 00:06:11 Duration
Lecture 2 Replacing HTTPS Downloads 00:05:12 Duration
Lecture 3 Injecting Data (Javascript, HTML elements 00:06:17 Duration
Lecture 4 Securing Systems From The Above Post Connection Attacks 00:05:40 Duration