Learn Network Hacking From Scratch (WiFi & Wired)
Posted by Superadmin on May 12 2020 04:06:23

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


01_01. Welcome



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_01. Lab Overview & Needed Software



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_01.1 Virtual Box Download Page.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_01.2 The lab.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_02. Installing Kali 2018 As a Virtual Machine



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_02.1 Kali Virtual Image Download Link.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_02.2 How To Fix No Nat Network Issue.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_02.3 How To Fix Blank Screen When Starting Kali.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_02.4 The-Lab.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_02.5 Installing Kali Using ISO (use this method to install it as a MAIN machine).html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_03. Creating & Using Snapshots



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_04. Kali Linux Overview



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_05. The Linux Terminal & Basic Commands



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


02_05.1 Linux Commands List.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_01. Network Basics



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_01.1 Networks Intro.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_02. Connecting a Wireless Adapter To Kali



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_02.1 Website That Sells Supported Wireless Adapters.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_02.2 Virtual Box Extension Pack Download Page.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_02.3 Best Wireless Adapters For Hacking.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_03. MAC Address - What Is It & How To Change It



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_04. Wireless Modes (Managed & Monitor mode)



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_04.1 Best USB Wireless (WiFi) Adapters For Hacking.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


03_04.2 Another Method to Enable Monitor Mode.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


04_01. Packet Sniffing Basics Using Airodump-ng



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


04_01.1 Pre Connection Attacks.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


04_02. Targeted Packet Sniffing Using Airodump-ng



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


04_03. Deauthentication Attack (Disconnecting Any Device From The Network)



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


05_01. Gaining Access Introduction



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


05_01.1 Network Hacking - Gaining Access.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


06_01. Theory Behind Cracking WEP Encryption



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


06_02. Basic Case



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


06_03. Associating With Target Network Using Fake Authentication Attack



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


06_04. Packet Injection - ARP Request Reply Attack



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


06_05. Packet Injection - Korek Chopchop Attack



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


06_06. Packet Injection - Fragmentation Attack



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_01. Introduction to WPA WPA2 Cracking



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_02. Exploiting the WPS Feature



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_03. How to Capture a Handshake



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_04. Creating a Wordlist Dictionary



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_04.1 Some-Links-To-Wordlists (1).txt



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_05. Cracking the Key Using a Wordlist Attack



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_06. Cracking the Key Quicker using a Rainbow Table



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_07. Quicker Wordlist Attack using the GPU



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_07.1 cap Converter.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_07.2 oclHashcat - advanced password recovery.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


07_07.3 HashCat GUI Download Link.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


08_01. Securing Your Network From The Above Attacks.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


08_02. How to Configure Wireless Security Settings To Secure Your Network



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


09_01. Post Connection Attacks Introduction



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


09_01.1 Post Connection Attacks.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


09_01.2 Network-Pentesting-Post-Connection-Attacks.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


09_02. Installing Windows As a Virtual machine



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


09_02.1 Windows Download Page.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


10_01. Discovering Connected Clients using netdiscover



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


10_01.1 04-post-connection-attacks.pdf



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


10_02. Gathering More Information Using Zenmap



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


10_03. Gathering Even More Information Using Zenmap



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_01. ARP Poisoning Theory



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_02. ARP Poisoning Using arpspoof



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_03. ARP Poisoning Using MITMf & Capturing Passwords Entered By Users On The Network



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_04. Bypassing HTTPS SSL



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_05. DNS Spoofing - Redirecting Requests From One Website To Another



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_06. Capturing Screen Of Target & Injecting a Keylogger



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_07. Injecting JavascriptHTML Code



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_08. Hooking Clients To Beef & Stealing Passwords



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_09. MITM - Using MITMf Against Real Networks



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_010. Wireshark - Basic Overview & How To Use It With MITM Attacks



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_011. Wireshark - Sniffing Data & Analysing HTTP Traffic



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_012. Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_013. Creating a Fake Access Point - Theory



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


11_014. Creating a Fake AP Using Mana-Toolkit



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_01. Bonus - Installing Veil 3.1



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_01.1 Veil 3 Git Repo.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_02. Bonus - Veil Overview & Payloads Basics



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_03. Bonus - Generating An Undetectable Backdoor Using Veil 3



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_03.1 Another way of generating an undetectable backdoor.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_04. Bonus - Listening For Incoming Connections



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_05. Creating a Fake AP Using Mana-Toolkit



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_06. Creating a Fake Update & Hacking Any Client in the Network



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_06.1 evilgrade-installation-commands-updated.txt



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


12_07. Meterpreter Basics - Interacting Wit Hacked Clients



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


13_01. Detecting ARP Poisoning Attacks



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


13_02. Detecting Suspicious Activities using Wireshark



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section

Learn Network Hacking From Scratch (WiFi & Wired)

with Zaid Sabih, z Security


14_01. Bonus Lecture - What's Next.html



Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

The Course is Divided into three main sections:
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.

Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPA or even WPA2.

Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

What you will Learn:
  • 60+ detailed videos about practical networks attacks
  • Crack WEP/WPA/WPA2 using a number of methods.
  • Intercept data and spy on all on the network
  • A number of practical attacks that can be used without knowing the key to the target network
  • Launch Various Man In The Middle attacks.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
  • Control connections of clients around you without knowing the password.
  • Hack any computer on the same network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • ARP Spoofing/ARP Poisonning
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Requirements:
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
      
Course Contents
1. Chapter 1 2. Preparation - Setting Up The Lab 3. Network Basics 4. Pre-Connection Attacks 5. Gaining Access 6. Gaining Access - WEP Cracking 7. Gaining Access - WPAWPA2 Cracking 8. Gaining Access - Security & Mitigation 9. Post Connection Attacks 10. Post Connection Attacks - Information Gathering 11. Post Connections Attacks - Man In The Middle Attacks (MITM) 12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network 13. ARP Poisoning Detection & Security 14. Bonus Section