Section 1 : Preparation - Setting Up The Lab
|
Lecture 1 | Introduction & Course Outline | 00:03:36 Duration |
|
Lecture 2 | Lab Overview & Needed Software | 00:05:00 Duration |
|
Lecture 3 | Installing Kali 2020 As a Virtual Machine | 00:05:00 Duration |
|
Lecture 4 | Creating & Using Snapshots | 00:05:00 Duration |
|
Lecture 5 | Kali Linux Overview | 00:05:00 Duration |
|
Lecture 6 | The Linux Terminal & Basic Commands | 00:05:00 Duration |
Section 2 : Network Basics
|
Lecture 1 | Network Basics | 00:04:29 Duration |
|
Lecture 2 | Connecting a Wireless Adapter To Kali | 00:05:00 Duration |
|
Lecture 3 | MAC Address - What Is It & How To Change It | 00:05:00 Duration |
|
Lecture 4 | Wireless Modes (Managed & Monitor mode) | 00:05:00 Duration |
Section 3 : Pre-Connection Attacks
|
Lecture 1 | Packet Sniffing Basics Using Airodump-ng | 00:05:00 Duration |
|
Lecture 2 | WiFi Bands - 2.4Ghz & 5Ghz Frequencies | 00:05:00 Duration |
|
Lecture 3 | Targeted Packet Sniffing Using Airodump-ng | 00:05:00 Duration |
|
Lecture 4 | Deauthentication Attack (Disconnecting Any Device |
Section 4 : Gaining Access
|
Lecture 1 | Gaining Access Introduction | 00:01:09 Duration |
Section 5 : Gaining Access - WEP Cracking
|
Lecture 1 | Theory Behind Cracking WEP Encryption | 00:05:00 Duration |
|
Lecture 2 | Basic Case | 00:05:00 Duration |
|
Lecture 3 | Associating With Target Network Using Fake Authent | 00:05:00 Duration |
|
Lecture 4 | Packet Injection - ARP Request Reply Attack | 00:05:00 Duration |
|
Lecture 5 | Packet Injection - Korek Chopchop Attack | 00:05:00 Duration |
|
Lecture 6 | Packet Injection - Fragmentation Attack | 00:05:00 Duration |
Section 6 : Gaining Access - WPA/WPA2Cracking
|
Lecture 1 | Introduction to WPA - WPA2 Cracking | 00:03:43 Duration |
|
Lecture 2 | Exploiting the WPS Feature | 00:05:00 Duration |
|
Lecture 3 | How to Capture a Handshake | 00:05:00 Duration |
|
Lecture 4 | Creating a Wordlist - Dictionary | 00:05:00 Duration |
|
Lecture 5 | Cracking the Key Using a Wordlist Attack | 00:05:00 Duration |
|
Lecture 6 | Cracking the Key Quicker using a Rainbow Table | 00:05:00 Duration |
|
Lecture 7 | Cracking WPA-WPA2 Much Faster Using GPU - Part 1 | 00:05:00 Duration |
|
Lecture 8 | Cracking WPA-WPA2 Much Faster Using GPU - Part 2 | 00:05:00 Duration |
Section 7 : Gaining Access - Security &Mitigation
|
Lecture 1 | About Certification | |
|
Lecture 2 | How to Configure Wireless Security Settings To Sec | 00:05:00 Duration |
Section 8 : Post Connection Attacks
|
Lecture 1 | Post Connection Attacks Introduction | 00:02:10 Duration |
|
Lecture 2 | Installing Windows As a Virtual machine | 00:02:38 Duration |
Section 9 : Post Connection AttacksInformationGathering
|
Lecture 1 | Discovering Connected Clients using netdiscover | 00:05:00 Duration |
|
Lecture 2 | Gathering More Information Using Zenmap | 00:05:00 Duration |
|
Lecture 3 | Gathering Even More Information Using Zenmap | 00:05:00 Duration |
Section 10 : Post Connections AttacksManInTheMiddleAttacks (MITM)
Section 11 : Post ConnectionAttacksGainingFullControlOverDevices On The
|
Lecture 1 | Bonus - Installing Veil 3.1 | |
|
Lecture 2 | Bonus - Veil Overview & Payloads Basics | 00:05:00 Duration |
|
Lecture 3 | Bonus - Generating An Undetectable Backdoor Using | |
|
Lecture 4 | Bonus - Listening For Incoming Connections | 00:05:00 Duration |
|
Lecture 5 | Bonus - Using A Basic Delivery Method To Test The | |
|
Lecture 6 | Creating a Fake Update & Hacking Any Client in the | 00:05:00 Duration |
|
Lecture 7 | Meterpreter Basics - Interacting Wit Hacked Client | 00:05:00 Duration |
Section 12 : ARP PoisoningDetection&Security
|
Lecture 1 | Detecting ARP Poisoning Attacks | 00:05:00 Duration |
|
Lecture 2 | Detecting Suspicious Activities using Wireshark | 00:05:00 Duration |