Section 1 : Preparation - Setting Up The Lab

Lecture 1 Introduction & Course Outline 00:03:36 Duration
Lecture 2 Lab Overview & Needed Software 00:05:00 Duration
Lecture 3 Installing Kali 2020 As a Virtual Machine 00:05:00 Duration
Lecture 4 Creating & Using Snapshots 00:05:00 Duration
Lecture 5 Kali Linux Overview 00:05:00 Duration
Lecture 6 The Linux Terminal & Basic Commands 00:05:00 Duration

Section 2 : Network Basics

Lecture 1 Network Basics 00:04:29 Duration
Lecture 2 Connecting a Wireless Adapter To Kali 00:05:00 Duration
Lecture 3 MAC Address - What Is It & How To Change It 00:05:00 Duration
Lecture 4 Wireless Modes (Managed & Monitor mode) 00:05:00 Duration

Section 3 : Pre-Connection Attacks

Lecture 1 Packet Sniffing Basics Using Airodump-ng 00:05:00 Duration
Lecture 2 WiFi Bands - 2.4Ghz & 5Ghz Frequencies 00:05:00 Duration
Lecture 3 Targeted Packet Sniffing Using Airodump-ng 00:05:00 Duration
Lecture 4 Deauthentication Attack (Disconnecting Any Device

Section 4 : Gaining Access

Lecture 1 Gaining Access Introduction 00:01:09 Duration

Section 5 : Gaining Access - WEP Cracking

Lecture 1 Theory Behind Cracking WEP Encryption 00:05:00 Duration
Lecture 2 Basic Case 00:05:00 Duration
Lecture 3 Associating With Target Network Using Fake Authent 00:05:00 Duration
Lecture 4 Packet Injection - ARP Request Reply Attack 00:05:00 Duration
Lecture 5 Packet Injection - Korek Chopchop Attack 00:05:00 Duration
Lecture 6 Packet Injection - Fragmentation Attack 00:05:00 Duration

Section 6 : Gaining Access - WPA/WPA2Cracking

Lecture 1 Introduction to WPA - WPA2 Cracking 00:03:43 Duration
Lecture 2 Exploiting the WPS Feature 00:05:00 Duration
Lecture 3 How to Capture a Handshake 00:05:00 Duration
Lecture 4 Creating a Wordlist - Dictionary 00:05:00 Duration
Lecture 5 Cracking the Key Using a Wordlist Attack 00:05:00 Duration
Lecture 6 Cracking the Key Quicker using a Rainbow Table 00:05:00 Duration
Lecture 7 Cracking WPA-WPA2 Much Faster Using GPU - Part 1 00:05:00 Duration
Lecture 8 Cracking WPA-WPA2 Much Faster Using GPU - Part 2 00:05:00 Duration

Section 7 : Gaining Access - Security &Mitigation

Lecture 1 About Certification
Lecture 2 How to Configure Wireless Security Settings To Sec 00:05:00 Duration

Section 8 : Post Connection Attacks

Lecture 1 Post Connection Attacks Introduction 00:02:10 Duration
Lecture 2 Installing Windows As a Virtual machine 00:02:38 Duration

Section 9 : Post Connection AttacksInformationGathering

Lecture 1 Discovering Connected Clients using netdiscover 00:05:00 Duration
Lecture 2 Gathering More Information Using Zenmap 00:05:00 Duration
Lecture 3 Gathering Even More Information Using Zenmap 00:05:00 Duration

Section 10 : Post Connections AttacksManInTheMiddleAttacks (MITM)

Lecture 1 ARP Poisoning Theory 00:05:00 Duration
Lecture 2 ARP Poisoning Using arpspoof 00:05:00 Duration
Lecture 3 Bettercap Basics 00:05:00 Duration
Lecture 4 ARP Poisoning Using Bettercap 00:05:00 Duration
Lecture 5 Spying on Network Devices (Capturing Passwords, Vi 00:05:00 Duration
Lecture 6 Creating Custom Spoofing Script 00:05:00 Duration
Lecture 7 Creating Custom Spoofing Script 00:05:00 Duration
Lecture 8 Understanding HTTPS & How to Bypass it 00:05:00 Duration
Lecture 9 Bypassing HTTPS 00:05:00 Duration
Lecture 10 Bypassing HSTS 00:05:00 Duration
Lecture 11 DNS Spoofing - Redirecting Requests From One Websi 00:05:00 Duration
Lecture 12 Injecting Javascript Code 00:05:00 Duration
Lecture 13 Wireshark - Basic Overview & How To Use It With MI
Lecture 14 Wireshark - Sniffing & Analysing Data 00:05:00 Duration
Lecture 15 Wireshark - Sniffing & Analysing Data 00:05:00 Duration
Lecture 16 Wireshark - Using Filters, Tracing & Dissecting Pa 00:05:00 Duration
Lecture 17 Wireshark - Capturing Passwords & Anything Sent By 00:05:00 Duration
Lecture 18 Creating a Fake Access Point - Theory 00:05:00 Duration
Lecture 19 Creating a Fake AP Using Mana-Toolkit 00:05:00 Duration

Section 11 : Post ConnectionAttacksGainingFullControlOverDevices On The

Lecture 1 Bonus - Installing Veil 3.1
Lecture 2 Bonus - Veil Overview & Payloads Basics 00:05:00 Duration
Lecture 3 Bonus - Generating An Undetectable Backdoor Using
Lecture 4 Bonus - Listening For Incoming Connections 00:05:00 Duration
Lecture 5 Bonus - Using A Basic Delivery Method To Test The
Lecture 6 Creating a Fake Update & Hacking Any Client in the 00:05:00 Duration
Lecture 7 Meterpreter Basics - Interacting Wit Hacked Client 00:05:00 Duration

Section 12 : ARP PoisoningDetection&Security

Lecture 1 Detecting ARP Poisoning Attacks 00:05:00 Duration
Lecture 2 Detecting Suspicious Activities using Wireshark 00:05:00 Duration