Section 1 : Preparation - Setting Up The Lab

lecture 1 Introduction & Course Outline 3:36
lecture 2 Lab Overview & Needed Software 5:0
lecture 3 Installing Kali 2020 As a Virtual Machine 5:0
lecture 4 Creating & Using Snapshots 5:0
lecture 5 Kali Linux Overview 5:0
lecture 6 The Linux Terminal & Basic Commands 5:0

Section 2 : Network Basics

lecture 7 Network Basics 4:29
lecture 8 Connecting a Wireless Adapter To Kali 5:0
lecture 9 MAC Address - What Is It & How To Change It 5:0
lecture 10 Wireless Modes (Managed & Monitor mode) 5:0

Section 3 : Pre-Connection Attacks

lecture 11 Packet Sniffing Basics Using Airodump-ng 5:0
lecture 12 WiFi Bands - 2.4Ghz & 5Ghz Frequencies 5:0
lecture 13 Targeted Packet Sniffing Using Airodump-ng 5:0
lecture 14 Deauthentication Attack (Disconnecting Any Device

Section 4 : Gaining Access

lecture 15 Gaining Access Introduction 1:9

Section 5 : Gaining Access - WEP Cracking

lecture 16 Theory Behind Cracking WEP Encryption 5:0
lecture 17 Basic Case 5:0
lecture 18 Associating With Target Network Using Fake Authent 5:0
lecture 19 Packet Injection - ARP Request Reply Attack 5:0
lecture 20 Packet Injection - Korek Chopchop Attack 5:0
lecture 21 Packet Injection - Fragmentation Attack 5:0

Section 6 : Gaining Access - WPA/WPA2Cracking

lecture 22 Introduction to WPA - WPA2 Cracking 3:43
lecture 23 Exploiting the WPS Feature 5:0
lecture 24 How to Capture a Handshake 5:0
lecture 25 Creating a Wordlist - Dictionary 5:0
lecture 26 Cracking the Key Using a Wordlist Attack 5:0
lecture 27 Cracking the Key Quicker using a Rainbow Table 5:0
lecture 28 Cracking WPA-WPA2 Much Faster Using GPU - Part 1 5:0
lecture 29 Cracking WPA-WPA2 Much Faster Using GPU - Part 2 5:0

Section 7 : Gaining Access - Security &Mitigation

lecture 30 About Certification Pdf
lecture 31 How to Configure Wireless Security Settings To Sec 5:0

Section 8 : Post Connection Attacks

lecture 32 Post Connection Attacks Introduction 2:10
lecture 33 Installing Windows As a Virtual machine 2:38

Section 9 : Post Connection AttacksInformationGathering

lecture 34 Discovering Connected Clients using netdiscover 5:0
lecture 35 Gathering More Information Using Zenmap 5:0
lecture 36 Gathering Even More Information Using Zenmap 5:0

Section 10 : Post Connections AttacksManInTheMiddleAttacks (MITM)

lecture 37 ARP Poisoning Theory 5:0
lecture 38 ARP Poisoning Using arpspoof 5:0
lecture 39 Bettercap Basics 5:0
lecture 40 ARP Poisoning Using Bettercap 5:0
lecture 41 Spying on Network Devices (Capturing Passwords, Vi 5:0
lecture 42 Creating Custom Spoofing Script 5:0
lecture 42 Creating Custom Spoofing Script 5:0
lecture 43 Understanding HTTPS & How to Bypass it 5:0
lecture 44 Bypassing HTTPS 5:0
lecture 45 Bypassing HSTS 5:0
lecture 46 DNS Spoofing - Redirecting Requests From One Websi 5:0
lecture 47 Injecting Javascript Code 5:0
lecture 48 Wireshark - Basic Overview & How To Use It With MI
lecture 49 Wireshark - Sniffing & Analysing Data 5:0
lecture 49 Wireshark - Sniffing & Analysing Data 5:0
lecture 50 Wireshark - Using Filters, Tracing & Dissecting Pa 5:0
lecture 51 Wireshark - Capturing Passwords & Anything Sent By 5:0
lecture 52 Creating a Fake Access Point - Theory 5:0
lecture 53 Creating a Fake AP Using Mana-Toolkit 5:0

Section 11 : Post ConnectionAttacksGainingFullControlOverDevices On The

lecture 54 Bonus - Installing Veil 3.1
lecture 55 Bonus - Veil Overview & Payloads Basics 5:0
lecture 56 Bonus - Generating An Undetectable Backdoor Using
lecture 57 Bonus - Listening For Incoming Connections 5:0
lecture 58 Bonus - Using A Basic Delivery Method To Test The Pdf
lecture 59 Creating a Fake Update & Hacking Any Client in the 5:0
lecture 60 Meterpreter Basics - Interacting Wit Hacked Client 5:0

Section 12 : ARP PoisoningDetection&Security

lecture 61 Detecting ARP Poisoning Attacks 5:0
lecture 62 Detecting Suspicious Activities using Wireshark 5:0