-
Урок 1.
00:03:37
Introduction & Course Outline
-
Урок 2.
00:05:55
Lab Overview & Needed Software
-
Урок 3.
00:08:56
Initial Preparation
-
Урок 4.
00:08:56
Installing Kali Linux as a VM on Windows
-
Урок 5.
00:09:39
Installing Kali Linux as a VM on Apple Mac OS
-
Урок 6.
00:09:09
Installing Kali Linux as a VM on Apple M1 Computers
-
Урок 7.
00:10:47
Installing Kali Linux as a VM on Linux
-
Урок 8.
00:05:11
Kali Linux Overview
-
Урок 9.
00:13:07
The Linux Terminal & Basic Commands
-
Урок 10.
00:04:29
Network Basics
-
Урок 11.
00:06:52
Connecting a Wireless Adapter To Kali
-
Урок 12.
00:08:21
MAC Address - What Is It & How To Change It
-
Урок 13.
00:06:58
Wireless Modes (Managed & Monitor mode)
-
Урок 14.
00:06:41
Packet Sniffing Basics Using Airodump-ng
-
Урок 15.
00:07:55
WiFi Bands - 2.4Ghz & 5Ghz Frequencies
-
Урок 16.
00:10:31
Targeted Packet Sniffing Using Airodump-ng
-
Урок 17.
00:06:51
Deauthentication Attack (Disconnecting Any Device From The Network)
-
Урок 18.
00:01:10
Gaining Access Introduction
-
Урок 19.
00:05:48
Theory Behind Cracking WEP Encryption
-
Урок 20.
00:06:18
Basic Case
-
Урок 21.
00:06:46
Associating With Target Network Using Fake Authentication Attack
-
Урок 22.
00:06:10
Packet Injection - ARP Request Reply Attack
-
Урок 23.
00:07:43
Packet Injection - Korek Chopchop Attack
-
Урок 24.
00:07:45
Packet Injection - Fragmentation Attack
-
Урок 25.
00:03:43
Introduction to WPA / WPA2 Cracking
-
Урок 26.
00:08:17
Exploiting the WPS Feature
-
Урок 27.
00:06:50
How to Capture a Handshake
-
Урок 28.
00:07:34
Creating a Wordlist / Dictionary
-
Урок 29.
00:06:27
Cracking the Key Using a Wordlist Attack
-
Урок 30.
00:07:01
Cracking the Key Quicker using a Rainbow Table
-
Урок 31.
00:07:20
Cracking WPA/WPA2 Much Faster Using GPU - Part 1
-
Урок 32.
00:10:40
Cracking WPA/WPA2 Much Faster Using GPU - Part 2
-
Урок 33.
00:08:06
How to Configure Wireless Security Settings To Secure Your Network
-
Урок 34.
00:02:11
Post Connection Attacks Introduction
-
Урок 35.
00:06:10
Installing Windows As a Virtual machine
-
Урок 36.
00:08:40
Discovering Connected Clients using netdiscover
-
Урок 37.
00:06:46
Gathering More Information Using Zenmap
-
Урок 38.
00:08:09
Gathering Even More Information Using Zenmap
-
Урок 39.
00:09:05
ARP Poisoning Theory
-
Урок 40.
00:06:31
ARP Poisoning Using arpspoof
-
Урок 41.
00:08:40
Bettercap Basics
-
Урок 42.
00:08:18
ARP Poisoning Using Bettercap
-
Урок 43.
00:05:12
Spying on Network Devices (Capturing Passwords, Visited Websites...etc)
-
Урок 44.
00:09:55
Creating Custom Spoofing Script
-
Урок 45.
00:06:07
Understanding HTTPS & How to Bypass it
-
Урок 46.
00:11:13
Bypassing HTTPS
-
Урок 47.
00:10:10
Bypassing HSTS
-
Урок 48.
00:10:52
DNS Spoofing - Redirecting Requests From One Website To Another
-
Урок 49.
00:10:27
Injecting Javascript Code
-
Урок 50.
00:10:30
Running all the Above Using a Graphical Interface
-
Урок 51.
00:08:25
Wireshark - Basic Overview & How To Use It With MITM Attacks
-
Урок 52.
00:05:31
Wireshark - Sniffing & Analysing Data
-
Урок 53.
00:06:29
Wireshark - Using Filters, Tracing & Dissecting Packets
-
Урок 54.
00:07:50
Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network
-
Урок 55.
00:07:30
Creating a Fake Access Point - Theory
-
Урок 56.
00:09:32
Creating a Fake AP Using Mana-Toolkit
-
Урок 57.
00:03:57
Bonus - Installing Veil 3.1
-
Урок 58.
00:07:22
Bonus - Veil Overview & Payloads Basics
-
Урок 59.
00:10:20
Bonus - Generating An Undetectable Backdoor Using Veil 3
-
Урок 60.
00:07:19
Bonus - Listening For Incoming Connections
-
Урок 61.
00:07:13
Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
-
Урок 62.
00:11:49
Creating a Fake Update & Hacking Any Client in the Network
-
Урок 63.
00:05:36
Meterpreter Basics - Interacting Wit Hacked Clients
-
Урок 64.
00:05:06
Detecting ARP Poisoning Attacks
-
Урок 65.
00:05:42
Detecting Suspicious Activities using Wireshark