Section 1 : Introduction

Lecture 1 Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10 6:42
Lecture 2 Course Overview 5:25

Section 2 : Back To BasicsPre-Connection Attacks

Lecture 3 Pre-connection Attacks Overview
Lecture 4 Spoofing Mac Address Manually 3:24
Lecture 5 Targeting 5 GHz Networks 6:44
Lecture 6 Deauthenticating a Client From Protected WiFi Networks 6:55
Lecture 7 Deauthenticating Multiple Clients From Protected WiFi Networks 7:51
Lecture 8 Deauthenticating All Clients From Protected WiFi Network 6:5
Lecture 9 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 3 : Gaining Access

Lecture 10 Gaining Access Overview 2:29
Lecture 11 Discovering Hidden Networks 8:12
Lecture 12 Connecting To Hidden Networks 5:14
Lecture 13 Bypassing Mac Filtering (Blacklists & Whitelists) 9:4
Lecture 14 Cracking SKA WEP Networks 9:5
Lecture 15 Securing Systems From The Above Attacks 3:18

Section 4 : Gaining Access - Captive Portals

Lecture 16 Sniffing Captive Portal Login Information In Monitor Mode 9:59
Lecture 17 Sniffing Captive Portal Login Information Using ARP Spoofing 8:55
Lecture 18 Creating a Fake Captive Portal - Introduction 4:19
Lecture 19 Creating Login Page - Cloning a Login Page 7:17
Lecture 20 Creating Login Page - Fixing Relative Links 6:54
Lecture 21 Creating Login Page - Adding Form Tag 7:44
Lecture 22 Creating Login Page - Adding Submit Button 6:45
Lecture 23 Preparing Computer To Run Fake Captive Portal 7:57
Lecture 24 Starting The Fake Captive Portal 11:58
Lecture 25 Redirecting Requests To Captive Portal Login Page
Lecture 26 Generating Fake SSL Certificate 5:54
Lecture 27 Enabling SSLHTTPS On Webserver 7:50
Lecture 28 Sniffing & Analysing Login Credentials 6:3

Section 5 : Gaining Access - WPA & WPA2 Cracking - Exploiting WPS

Lecture 29 Exploiting WPS - Introduction 1:34
Lecture 30 Bypassing Failed to associate Issue 7:40
Lecture 31 Bypassing 0x3 and 0x4 Errors 7:40
Lecture 32 WPS Lock - What Is It & How To Bypass It 7:2
Lecture 33 Unlocking WPS 8:41

Section 6 : Gaining Access - WPA & WPA2 Cracking - Advanced Wordlist Attack

Lecture 34 Advanced Wordlist Attacks - Introduction 1:39
Lecture 35 Saving Cracking Progress 9:44
Lecture 36 Using Huge Wordlists Without Wasting Storage 7:35
Lecture 37 Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 10:5
Lecture 38 Cracking WPAWPA2 Much Faster Using GPU - Part 1 7:20
Lecture 39 Cracking WPAWPA2 Much Faster Using GPU - Part 2

Section 7 : Gaining Access - WPA & WPA2 Cracking - Evil Twin Attack

Lecture 40 What is It & How it Works 7:22
Lecture 41 Installing Needed Software 7:40
Lecture 42 Stealing WPA & WPA2 Key Using Evil Twin Attack Without Guessing 9:38
Lecture 43 Debugging & Fixing Login Interface Issues 11:52

Section 8 : Gaining Access - WPA & WPA2 Cracking - WPAWPA2 Enterprise

Lecture 44 What is WPA & WPA2 Enterprise & How it Works 5:25
Lecture 45 2 Methods To Hack WPA & WPA2 Enterprise 6:48
Lecture 46 Stealing Login Credentials 8:11
Lecture 47 Cracking Login Credentials 6:38
Lecture 48 Securing Systems From The Above Attacks 4:59

Section 9 : Post Connection Attacks

Lecture 49 Post Connection Attacks Overview
Lecture 50 Ettercap - Basic Overview 7:10
Lecture 51 Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 9:51
Lecture 52 Automatically ARP Poisoning New Clients 6:53
Lecture 53 DNS Spoofing Using Ettercap 5:30
Lecture 54 Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 9:18

Section 10 : Post Connection Attacks - Analysing Data Flows & Running Custom Attacks

Lecture 55 Introduction to MITMproxy 3:48
Lecture 56 Using MITMproxy In Explicit Mode 7:13
Lecture 57 Analysing (Filtering & Highlighting) Flows 5:13
Lecture 58 Intercepting Network Flows 4:51
Lecture 59 Modifying Responses & Injecting Javascript Manually 8:45
Lecture 60 Intercepting & Modifying Responses In Transparent Mode 7:31
Lecture 61 Editing Responses & Injecting BeEF's Code On The Fly 9:17
Lecture 62 Editing Responses Automatically Based On Regex 9:13
Lecture 63 [Bonus] - Stealing Login Info Using Fake Login Prompt 7:12
Lecture 64 [Bonus] - Hacking Windows 10 Using A Fake Update 4:41

Section 11 : Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks

Lecture 65 Introduction to MITM Scripts 6:14
Lecture 66 Capturing & Printing RequestsResponses 8:31
Lecture 67 Filtering Flows & Extracting Useful Data 9:25
Lecture 68 Using Conditions To Execute Code On Useful Flows 9:49
Lecture 69 Generating Custom HTTP Responses 8:36
Lecture 70 Testing Script Locally 8:30
Lecture 71 Generating Trojans - Installing The Trojan Factory 6:17
Lecture 72 Generating Trojans - Converting Any File (egimage) To a Trojan 10:16
Lecture 73 Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 7:8
Lecture 74 Executing Bash Commands & Calling Trojan Factory From Our Script 8:48
Lecture 75 Using Variables & More Complex Conditions
Lecture 76 Converting Downloads To Trojans On The Fly 10:10
Lecture 77 Configuring The Trojan Factory's MITMproxy Script 7:33
Lecture 78 Using The Trojan Factory MITMproxy Script 7:49

Section 12 : Post-Connection Attacks - Doing All Of The Above On HTTPS Websites

Lecture 79 Bypassing HTTPS With MITMproxy 6:11
Lecture 80 Replacing HTTPS Downloads 5:12
Lecture 81 Injecting Data (Javascript, HTML elements 6:17
Lecture 82 Securing Systems From The Above Post Connection Attacks 5:40