O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

ARP Spoofing and Man In The Middle Attacks: Execution and Detection

Video Description

Learn practical attacks to test the security of clients connected to a network and protect them

About This Video

  • You will learn how networks work, how devices communicate with each other, how the information is transferred in a wireless network, and how to map the current network.
  • Discover all the connected clients, gather important information about these clients, and launch powerful attacks.

In Detail

In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks. This course focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack - all the attacks explained in this course are launched against real devices. All the attacks in this course are practical attacks that work against any device connected to your network, so it does not matter what kind of device you are targeting. Each attack is explained in a simple way first so that you understand how it actually works - first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

Table of Contents

  1. Chapter 1 : Introduction & Course Outline
    1. Introduction & Course Outline 00:04:56
  2. Chapter 2 : Preparation
    1. Installing Kali 2018.1 As a Virtual Machine 00:08:31
    2. Kali Linux Overview 00:07:06
  3. Chapter 3 : Network Basics
    1. Network Basics 00:03:09
    2. Connecting a Wireless Adapter To Kali 00:07:18
    3. What is MAC Address & How To Change It 00:04:31
  4. Chapter 4 : Information Gathering
    1. Discovering Connected Clients using netdiscover 00:03:20
    2. Gathering More information using Autoscan 00:08:42
    3. Even More detailed information gathering using nmap 00:10:04
  5. Chapter 5 : MITM
    1. ARP Poisoning theory 00:05:51
    2. MITM - ARP Poisonning Using arpspoof 00:05:51
    3. MITM - ARP Poisonning Using MITMf 00:05:22
    4. MITM - Bypassing HTTPS 00:04:41
    5. MITM - Session Hijacking 00:06:34
    6. MITM - DNS Spoofing 00:05:10
    7. MITM - Capturing Screen Of Target & Injecting a Keylogger 00:05:07
    8. MITM - Injecting Javascript/HTML Code 00:06:43
    9. MITM - Hooking Clients To Beef & Stealing Passwords 00:09:56
    10. MITM - Using MITMf Against Real Networks 00:09:09
    11. Wireshark - Basic Overview & How To Use It With MITM Attacks 00:09:09
    12. Wireshark - Sniffing Data & Analysing HTTP Traffic 00:08:01
    13. Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network 00:05:37
    14. Creating An Undetectable Backdoor 00:07:08
    15. Listening For Incoming Connections 00:06:41
    16. Creating a Fake Update & Hacking Any Device In The Network 00:09:01
  6. Chapter 6 : Detection
    1. Detecting ARP Poisoning Attacks 00:05:11
    2. Detecting Suspicious Activities using Wireshark 00:05:51