Learn Network Hacking From Scratch (WiFi & Wired)
Learn Network Hacking From Scratch (WiFi & Wired), available at $159.99, has an average rating of 4.55, with 68 lectures, based on 6955 reviews, and has 72249 subscribers.
You will learn about 60+ detailed videos about practical networks attacks Control connections of clients around you without knowing the password. Crack WEP/WPA/WPA2 using a number of methods. Hack any computer on the same network. Intercept data and spy on all on the network Gather detailed information about clients and networks like their OS, opened ports …etc. A number of practical attacks that can be used without knowing the key to the target network ARP Spoofing/ARP Poisonning Launch Various Man In The Middle attacks. Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc. Detect ARP poisoning and protect your self and your network against it. You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit …etc. Combine individual attacks to launch even more powerful attacks. This course is ideal for individuals who are Anybody who is interested in learning about network penetration testing or Anybody interested into learning how to protect networks from hackers. It is particularly useful for Anybody who is interested in learning about network penetration testing or Anybody interested into learning how to protect networks from hackers.
Enroll now: Learn Network Hacking From Scratch (WiFi & Wired)
Summary
Title: Learn Network Hacking From Scratch (WiFi & Wired)
Price: $159.99
Average Rating: 4.55
Number of Lectures: 68
Number of Published Lectures: 65
Number of Curriculum Items: 68
Number of Published Curriculum Objects: 65
Original Price: $89.99
Quality Status: approved
Status: Live
What You Will Learn
- 60+ detailed videos about practical networks attacks
- Control connections of clients around you without knowing the password.
- Crack WEP/WPA/WPA2 using a number of methods.
- Hack any computer on the same network.
- Intercept data and spy on all on the network
- Gather detailed information about clients and networks like their OS, opened ports …etc.
- A number of practical attacks that can be used without knowing the key to the target network
- ARP Spoofing/ARP Poisonning
- Launch Various Man In The Middle attacks.
- Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
- Detect ARP poisoning and protect your self and your network against it.
- You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit …etc.
- Combine individual attacks to launch even more powerful attacks.
Who Should Attend
- Anybody who is interested in learning about network penetration testing
- Anybody interested into learning how to protect networks from hackers.
Target Audiences
- Anybody who is interested in learning about network penetration testing
- Anybody interested into learning how to protect networks from hackers.
Last Update: May 2024
Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you’ll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts.
This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software(works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.
The Course is Divided into three main sections:
-
Pre-connection attacks: In this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn some basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don’t know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) without knowing the password of the target network.
-
Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network whether it uses WEP, WPAor even WPA2.
-
Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos, etc.), redirect requests, inject evil code in loaded pages and even gain full control over connected clients! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.
All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop, etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android, ect.). in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life scenario, so by the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.
With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.
Notes:
-
This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test
-
This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction & Course Outline
Chapter 2: Preparation – Setting Up The Lab
Lecture 1: Lab Overview & Needed Software
Lecture 2: Initial Preparation
Lecture 3: Installing Kali Linux as a VM on Windows
Lecture 4: Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)
Lecture 5: Installing Kali Linux as a VM on Linux
Lecture 6: Kali Linux Overview
Lecture 7: The Linux Terminal & Basic Commands
Chapter 3: Network Basics
Lecture 1: Network Basics
Lecture 2: Connecting a Wireless Adapter To Kali
Lecture 3: MAC Address – What Is It & How To Change It
Lecture 4: Wireless Modes (Managed & Monitor mode)
Chapter 4: Pre-Connection Attacks
Lecture 1: Packet Sniffing Basics Using Airodump-ng
Lecture 2: WiFi Bands – 2.4Ghz & 5Ghz Frequencies
Lecture 3: Targeted Packet Sniffing Using Airodump-ng
Lecture 4: Deauthentication Attack (Disconnecting Any Device From The Network)
Chapter 5: Gaining Access
Lecture 1: Gaining Access Introduction
Chapter 6: Gaining Access – WEP Cracking
Lecture 1: Theory Behind Cracking WEP Encryption
Lecture 2: Basic Case
Lecture 3: Associating With Target Network Using Fake Authentication Attack
Lecture 4: Packet Injection – ARP Request Reply Attack
Lecture 5: Packet Injection – Korek Chopchop Attack
Lecture 6: Packet Injection – Fragmentation Attack
Chapter 7: Gaining Access – WPA/WPA2 Cracking
Lecture 1: Introduction to WPA / WPA2 Cracking
Lecture 2: Exploiting the WPS Feature
Lecture 3: How to Capture a Handshake
Lecture 4: Creating a Wordlist / Dictionary
Lecture 5: Cracking the Key Using a Wordlist Attack
Lecture 6: Cracking the Key Quicker using a Rainbow Table
Lecture 7: Cracking WPA/WPA2 Much Faster Using GPU – Part 1
Lecture 8: Cracking WPA/WPA2 Much Faster Using GPU – Part 2
Chapter 8: Gaining Access – Security & Mitigation
Lecture 1: Securing Your Network From The Above Attacks
Lecture 2: How to Configure Wireless Security Settings To Secure Your Network
Chapter 9: Post Connection Attacks
Lecture 1: Post Connection Attacks Introduction
Lecture 2: Installing Windows As a Virtual machine
Lecture 3: Installing Windows as a Virtual Machine on Apple Silicon Computers
Chapter 10: Post Connection Attacks – Information Gathering
Lecture 1: Discovering Connected Clients using netdiscover
Lecture 2: Gathering More Information Using Zenmap
Lecture 3: Gathering Even More Information Using Zenmap
Chapter 11: Post Connections Attacks – Man In The Middle Attacks (MITM)
Lecture 1: ARP Poisoning Theory
Lecture 2: ARP Poisoning Using arpspoof
Lecture 3: Bettercap Basics
Lecture 4: ARP Poisoning Using Bettercap
Lecture 5: Spying on Network Devices (Capturing Passwords, Visited Websites…etc)
Lecture 6: Creating Custom Spoofing Script
Lecture 7: Bypassing HTTPS
Lecture 8: Bypassing HSTS
Lecture 9: DNS Spoofing – Redirecting Requests From One Website To Another
Lecture 10: Injecting Javascript Code
Lecture 11: Running all the Above Using a Graphical Interface
Lecture 12: Wireshark – Basic Overview & How To Use It With MITM Attacks
Lecture 13: Wireshark – Sniffing & Analysing Data
Lecture 14: Wireshark – Using Filters, Tracing & Dissecting Packets
Lecture 15: Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network
Lecture 16: Creating a Fake Access Point – Theory
Lecture 17: Creating a Fake AP Using Mana-Toolkit
Chapter 12: Post Connection Attacks – Gaining Full Control Over Devices On The Same Network
Lecture 1: Backdoors and Payloads Basics
Lecture 2: Creating Your Own Backdoor
Lecture 3: Listening for Backdoor Connections
Lecture 4: Hacking Windows 11 Using Your Own Backdoor
Lecture 5: How to Bypass Anti-Virus Programs
Lecture 6: Meterpreter Basics – Interacting Wit Hacked Clients
Chapter 13: ARP Poisoning Detection & Security
Lecture 1: Detecting ARP Poisoning Attacks
Lecture 2: Detecting Suspicious Activities using Wireshark
Chapter 14: Bonus Section
Lecture 1: Bonus Lecture – What's next?
Instructors
-
Zaid Sabih
Ethical Hacker, Computer Scientist & CEO of zSecurity -
z Security
Leading provider of ethical hacking and cyber security training,
Rating Distribution
- 1 stars: 40 votes
- 2 stars: 71 votes
- 3 stars: 473 votes
- 4 stars: 2170 votes
- 5 stars: 4201 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024