Network Hacking Course to hack both WiFi and wired networks like black hat hackers and learn how to secure them from these attacks.
This course focuses on the practical side of penetration tests without neglecting the theory. Before jumping into piracy, you will first learn how to set up a lab and install the necessary software (it works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of Linux, information systems. Networks and how devices communicate with each other, then learn how to exploit this method of communication to carry out a series of powerful attacks.
The course is divided into three main sections:
Pre-connection attacks: In this section, you will learn how networks work, how devices communicate with each other, and how information is transferred over a wireless network. You will also learn about basic terminology, what is a channel? MAC address? What is the managed mode? What is the monitor mode and how to enable it? What is sniffing and what is it limited to? so in this section we still do not know much about penetration tests, all we have is a computer and a wireless card connected to it, you will learn how to start collecting information using your wi-fi card (package detection) and learn how to control the connections around it (that is, deny/allow devices to connect to networks) even without knowing the password of the target network.
Getting access: Now that you have gathered information about the networks that surround you, in this section, you will learn a number of methods to decipher the key and obtain the password for your destination network if you use WEP, WPA or even WPA2.
Post-connection attacks: now that you have the key, you can connect to the destination network, in this section you will learn a series of powerful techniques that will allow you to collect complete information about connected devices, see everything they do on the Internet (such as information Login, passwords, visited URLs, images, videos, etc., redirect requests, inject malicious code into the loaded pages and even gain full control over any client on your network. Wired networks You will also learn how to create a fake WiFi network, attract users to connect to it and use all previous techniques against connected clients.
All attacks in this course are practical attacks that work against any wireless device enabled, that is: it does not matter if the device is a phone, portable tablet, etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android, etc.). In each technique you will understand the theory that supports it and how it works, then you will learn to use that technique in a real-life scenario, so at the end of the course, you can modify these techniques or combine them. to devise more powerful attacks and adopt them in different scenarios and different operating systems.
What you’ll learn:
More than 60 detailed videos about practical networks of attacks.
Control the connections of customers around you without knowing the password.
Break WEP / WPA / WPA2 using several methods.
Hack any computer on the same network.
Intercept data and spy on everyone in the network.
Gather detailed information about clients and networks such as your operating system, open ports, etc.
A series of practical attacks that can be used without knowing the key of the target network.
ARP Spoofing / ARP Poisoning.
Launch several man attacks in the middle.
Smell client packages and analyze them to extract important information, such as passwords, cookies, URLs, videos, images, etc.
Detect ARP poisoning and protect yourself and your network against it.
You can use more than 20 penetration test tools such as ettercap, wireshark, aircrack-ng suit, etc.
Combine individual attacks to launch even more powerful attacks.
Who this course is for:
Anybody who is interested in learning about network penetration testing
Anybody interested into learning how to protect networks from hackers.
Created by Zaid Sabih, z Security
Last updated 5/2019
Size: 4.10 GB