O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Network Hacking Continued - Intermediate to Advanced

Video Description

Learn advanced techniques to hack into WiFi and wired networks

About This Video

  • You will learn a number of advanced techniques to gain access to various network configurations and various network encryptions.
  • You will learn how to discover and target hidden networks t and to access secure networks without passwords.

In Detail

Welcome to this advanced network hacking course, designed to build up on what you already know about network hacking. It's recommended that you complete the network hacking section of the author's general ethical hacking course or finish his network hacking course before starting this course. Just like all of his other courses, this course is highly practical, whilst including the theory, but, since this is an advanced courseeach attack will be broken into its smaller components in order to understand how each of these components work; by the end of the course you will be able to mix these attacks and adopt attacks to suit different situations and different scenarios, and write your own man-in-the-middle scripts to implement your own man-in-the-middle attacks. Because this course builds on what you learn in the courses mentioned above, the main sections here have similar titles but the topics covered here are more advanced. Finally, at the end of the course, you will learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical attacks that work against real computers. In each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real-life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adapt them to different scenarios and different operating systems.

Table of Contents

  1. Chapter 1 : Introduction
    1. Teaser - Converting Downloads To Trojans on the Fly & Hacking Windows 10 00:06:42
    2. Course Overview 00:05:25
  2. Chapter 2 : Back to Basics/Pre-Connection Attacks
    1. Pre-connection Attacks Overview 00:01:55
    2. Spoofing Mac Address Manually 00:03:24
    3. Targeting 5 GHz Networks 00:06:44
    4. Deauthenticating a Client from Protected Wi-Fi Networks 00:06:55
    5. Deauthenticating Multiple Clients from Protected WiFi Networks 00:07:51
    6. Deauthenticating All Clients from Protected WiFi Network 00:06:05
  3. Chapter 3 : Gaining Access
    1. Gaining Access Overview 00:02:29
    2. Discovering Names of Hidden Networks 00:08:12
    3. Connecting To Hidden Networks 00:05:14
    4. Bypassing Mac Filtering (Blacklists & Whitelists) 00:09:04
    5. Cracking SKA WEP Networks 00:09:05
    6. Securing Systems from the Above Attacks 00:03:18
  4. Chapter 4 : Gaining Access - Captive Portals
    1. Sniffing Captive Portal Login Information in Monitor Mode 00:09:59
    2. Sniffing Captive Portal Login Information Using ARP Spoofing 00:08:55
    3. Creating a Fake Captive Portal – Introduction 00:04:19
    4. Creating Login Page - Cloning a Login Page 00:07:17
    5. Creating Login Page - Fixing Relative Links 00:06:54
    6. Creating Login Page - Adding Form Tag 00:07:44
    7. Creating Login Page - Adding Submit Button 00:06:45
    8. Preparing Computer to Run Fake Captive Portal 00:07:57
    9. Starting the Fake Captive Portal 00:11:58
    10. Redirecting Requests to Captive Portal Login Page 00:12:19
    11. Generating Fake SSL Certificate 00:05:54
    12. Enabling SSL/HTTPS On Webserver 00:07:50
    13. Sniffing & Analyzing Login Credentials 00:06:03
  5. Chapter 5 : Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
    1. Exploiting WPS – Introduction 00:01:34
    2. Bypassing "Failed to associate" Issue 00:07:40
    3. Bypassing 0x3 and 0x4 Errors 00:07:40
    4. WPS Lock - What Is It & How To Bypass It 00:07:02
    5. Unlocking WPS 00:08:41
  6. Chapter 6 : Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
    1. Advanced Wordlist Attacks - Introduction 00:01:39
    2. Saving Aircrack-ng Cracking Progress 00:09:44
    3. Using Huge Wordlists With Aircrack-ng Without Wasting Storage 00:07:35
    4. Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 00:10:05
    5. Cracking WPA/WPA2 Much Faster Using GPU - Part 1 00:07:20
    6. Cracking WPA/WPA2 Much Faster Using GPU - Part 2 00:10:39
  7. Chapter 7 : Gaining Access - WPA/WPA Cracking - Evil Twin Attack
    1. What is It & How it Works 00:07:22
    2. Installing Needed Software 00:07:40
    3. Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 00:09:38
    4. Debugging & Fixing Login Interface 00:11:52
  8. Chapter 8 : Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
    1. What is WPA/WPA2 Enterprise & How it Works 00:05:25
    2. How To Hack WPA/WPA2 Enterprise 00:06:48
    3. Stealing Login Credentials 00:08:11
    4. Cracking Login Credentials 00:06:38
    5. Securing Systems From The Above Gaining Access Attacks 00:04:59
  9. Chapter 9 : Post Connection Attacks
    1. Post Connection Attacks Overview 00:04:22
    2. Ettercap - Basic Overview 00:07:10
    3. Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 00:09:51
    4. Setting up SSLstrip Manually to Bypass HTTPS & Sniff Data from HTTPS Websites 00:12:44
    5. Automatically ARP Poisoning New Clients 00:06:53
    6. DNS Spoofing Using Ettercap 00:05:31
    7. Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 00:09:18
  10. Chapter 10 : Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
    1. MITMproxy - What is It & How To Install It 00:03:48
    2. Using MITMproxy In Explicit Mode 00:07:13
    3. Analysing (Filtering & Highlighting) Flows 00:05:14
    4. Intercepting Network Flows 00:04:51
    5. Modifying Responses & Injecting Javascript Manually 00:08:45
    6. Intercepting & Modifying Responses In Transparent Mode 00:07:31
    7. Editing Responses & Injecting BeEF's Code On The Fly 00:09:17
    8. Editing Responses Automatically Based On Regex 00:09:13
    9. [Bonus] - Stealing Login Info Using Fake Login Prompt 00:07:12
    10. [Bonus] - Hacking Windows 10 Using A Fake Update 00:04:41
  11. Chapter 11 : Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
    1. What Do You Mean By MITM Scripts? 00:06:14
    2. Capturing & Printing Requests/Responses 00:08:31
    3. Filtering Flows & Extracting Useful Data 00:09:26
    4. Using Conditions To Execute Code On Useful Flows 00:09:49
    5. Generating Custom HTTP Responses 00:08:36
    6. Testing Script Locally 00:08:30
    7. Generating Trojans - Installing The Trojan Factory 00:06:17
    8. Generating Trojans - Converting Any File (eg:image) To a Trojan 00:10:16
    9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 00:07:08
    10. Executing Bash Commands & Calling Trojan Factory From Our Script 00:08:48
    11. Using Variables & More Complex Conditions 00:08:42
    12. Converting Downloads To Trojans On The Fly 00:10:10
    13. Configuring The Trojan Factory's MITMproxy Script 00:07:33
    14. Using The Trojan Factory MITMproxy Script 00:07:49
  12. Chapter 12 : Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
    1. Bypassing HTTPS with MITMproxy 00:06:11
    2. Replacing Downloads From HTTPS 00:05:12
    3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites 00:06:17
    4. Securing Systems From The Above Post Connection Attacks 00:05:40