Booking options
£44.99
£44.99
On-Demand course
5 hours 48 minutes
All levels
Build a strong foundation in ethical hacking with this course. In this course, you will start from scratch, from setting up your hacking lab environment to implementing advanced Wi-Fi attacks. Moreover, you will learn how to perform Man in the Middle attacks after gaining access to a Wi-Fi network and protect your connected devices from these kinds of attacks.
In this course, you will learn how to set up your Kali Linux lab environment properly. In addition to that, you will learn how devices communicate with each other. Lastly, you will learn the best out of this course, which is Man in the Middle attacks. This course is divided into six sections: - Preparation: In this section, you will learn how to download and set up the latest version of Kali Linux as a virtual machine or as your main OS. This helps you create your own safe hacking lab environment.
- Network basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing.
- Gather AP information before cracking: In this section, you will learn how you can enumerate the target access point such as ESSID-BSSID-Channel-Encryption type, and so on. You will learn how you can disconnect, kick any client from your target network, or even jam the wireless access point completely without having its password.
- Cracking WEP/WPA/WPA2 encryption: After gathering information about the target access point, it's time to learn how to crack WEP/WPA/WPA2 encryption keys and the theory behind each attack.
- MITM attack: In this section, you will learn how to perform man-in-the-middle attacks and what post-modules can be carried out on the target OS. Modules such as playing music on the target OS, stealing credentials, and many more. You will even learn how to gain full access to the connected devices.
- Protecting yourself against these attacks: After learning MITM attacks, it's time to learn how to protect your OS against all the previously mentioned attacks. By the end of the course, you will be able to perform MITM attack on the target network and fully control all the connected computers. You will be able to protect yourself from the MITM attack.
Learn to set up your Kali Linux environment
Dealing with a lot of Kali Linux tools
Carry out several attacks without having the key
Gain access to any client account in the Wi-Fi network
Launch Man in the Middle attack
Learn the basics of the network
This course is intended for beginners and professionals. If you are a beginner, you will start from scratch until you become a professional, and if you are a professional, this course will enhance and refresh your knowledge about wireless network hacking. This course is for people who want to do penetration testing against a specific Wi-Fi network.
This is a theoretical as well as a practical course based on learning MITM attacks. The author goes step by step starting from the installation and ending up on how one should protect oneself from these attacks. No prior knowledge is needed.
Detect ARP Poisoning (MITM) attack to protect yourself against it * Crack any Wi-Fi encryption using several methods * Understand how to hack the connected clients
Saad Sarraj is passionate cybersecurity and ethical hacking/penetration testing professional. He is also a TryHackMe Top 1% CTF Player. He has created courses to share what he has learned. He tries to make videos in a very simple way so that everyone learning penetration testing/cybersecurity gets the advantage and understands easily. He owns a YouTube channel called CyberSudo that focuses on cybersecurity and penetration testing. It also contains some videos from the courses.
1. Introduction
1. Introduction This video welcomes you to the course. |
2. Preparation
1. Set Up Kali Linux as Your Main OS This video introduces how to set up Kali Linux as your main OS. |
2. Set Up Kali as a Virtual Machine (VirtualBox) This video explains how to set up Kali as a Virtual Machine (VirtualBox). |
3. Set Up Kali Linux as a Virtual Machine (VMware) This video explains how to set up Kali Linux as a Virtual Machine (VMware). |
4. Configure NAT Network in VirtualBox This video explains how to configure NAT network in VirtualBox. |
5. Enhance Your Virtual Machine Performance This video explains how to enhance your virtual machine performance. |
6. Taking Snapshots of Virtual Machines This video explains how to take snapshots of virtual machines. |
7. Set Up Windows as a Virtual Machine This video explains how to set up your Windows environment properly without any issues, because in the future videos, we are going to use it in many scenarios as the victim computer. |
8. Connecting Wi-Fi Card to the Virtual Machine This video explains how to connect Wi-Fi cards to the virtual machine. |
9. Updating Kali Linux This video explains how to update Kali Linux. |
3. Networks Basics
1. Network Basics This video introduces you to network basics. |
2. What is MAC Address? How to Spoof It? This video explains MAC address and how it works, and how you can spoof your MAC address to bypass some hotels' paid Wi-Fi hotspot systems. |
3. Install ALFA AC1200 Driver on Kali Linux One of the issues you may face when using ALFA AC1200 adapter is that Kali might not recognize the adapter. In this lecture, you will learn how to solve this issue by installing the driver. |
4. Enabling Monitor Mode on Your Wi-Fi Adapter This video will show you how to enable monitor mode on your Wi-Fi card using two methods; this allows you to capture any packet that is in your Wi-Fi range. |
4. Gather AP Information Before Cracking
1. Pre-Connection Attacks Introduction This video is an introduction about gathering access point information. This video talks about what you are going to learn in the next videos. |
2. Scanning for Available Wi-Fi APs Around Us In this video, you will be able to see all the available Wi-Fi networks in your range, which will help you specify your target. |
3. Capturing Specific Wi-Fi Access Point packets This video explains how to capture a specific Wi-Fi Access point. |
4. Capturing All Wi-Fi Packets in Both (5/2.4) Ghz Bands In this lecture, you will learn how to use your ALFA wireless adapter to scan all the Wi-Fi networks that operate on both 2.4 and 5Ghz. |
5. Disconnect Any Device from Any Wireless Access Point In this video, you will learn how you can disconnect any client from any Wi-Fi network from your range even if you are not associated with the network; this will help you get a handshake file that we are going to use when we crack WPA/WPA2 key. |
6. Detecting Hidden Wi-Fi Networks This video will help you discover all the hidden networks in your Wi-Fi range, using the air dumping-ng tool, which is part of the aircrack-ng suite. |
7. Jamming Any Wi-Fi Access Point In this video, we will see how you can jam any Wi-Fi network that is in your range, and this will disconnect all the clients in your target network, and no one will be able to connect to your target network. We will explain two methods using two different tools (aireplay-ng and Websploit). |
5. Cracking WEP Encryption
1. Introduction This video is an overview of what you will learn in the next videos. |
2. Cracking WEP Encryption Explain | Theory This video is about how WEP encryption works, the weakness in WEP encryption, and the theory behind cracking WEP encryption. |
3. Cracking WEP Encryption Key Methods In this video, we will talk about the methods that we are going to use in the next videos to crack WEP encryption key. |
4. Cracking WEP Encryption Demo This video is a demonstration about what's happening in the real world when you want to crack WEP encryption, so first, we will specify our target then capture a huge number of data packets. We will then use aircrack-ng to do a statistical attack and determine the WEP key by capturing two packets that have the same IV. |
5. Fake Authentication with the Target Network This video will show you how you can fake-authenticate your Wi-Fi card with any Wi-Fi access point that has WEP encryption. This will help you inject a new packet into the traffic and shorten the time of the attack. |
6. Cracking WEP Using Korek Chopchop Attack This method is quicker than the one we saw in the demonstration lecture because it depends on capturing an ARP packet from the network and injecting it again into the traffic. |
7. Cracking WEP Using ARP Request Replay Attack In this video, we will see the best and quicker method that will help you crack the password. This method depends on capturing an ARP packet then injecting it again into the traffic. This leads to a rapid increase in the number of data packets, after which we will use aircrack-ng to crack the password using a statistical attack to determine the key. |
8. Cracking WEP Using Hirte Attack In this video, you will be able to crack WEP encryption key using Hirte attack method. Hirte is a type of attack that aims to crack the WEP key of wireless networks that are not reachable, but the client device is in the area of the attacker. |
6. Cracking WEP/WEP2 Encryptions
1. Cracking WPA/WPA2 Encryption Explain In this video, we will cover how WPA and WPA2 encryption works, because understanding the algorithm helps you know what's happening in the real world. |
2. Cracking WPA/WPA2 Encryption Methods This video talks about the method that we can apply on our target network to crack the password; there is more than one encryption method that can help you achieve your goal and get the password. |
3. Cracking WPA/WPA2 Using the WPS Feature In this video, you will learn how to crack WPA2 key without using a word list. This is done by brute forcing the PIN number of the target router; once done, the Reaver tool will reverse engineer it and get the actual key. |
4. Capturing the Handshake Before we crack WPA2 key, we will learn how to capture the handshake, which is done by disconnecting any client from the network and letting him connect again. |
5. Creating a Wordlist In this video, you will learn how to create your own wordlist to brute force the target AP to get the key, using the crunch tool. |
6. Cracking WPA/WPA2 Using Dictionary Attack After creating your wordlist, you will learn how to crack WPA/WPA2 encryption key using your wordlist, which is done by comparing the PMK with the handshake. |
7. Cracking WPA/WPA2 Using Brute Force Attack In this video, you don't have to create a wordlist, because you will use the crunch tool and the aircrack-ng tool at the same time. So, crunch will generate the passwords then aircrack-ng will compare each password with the PMK. |
8. Cracking WPA/WPA2 Using Rainbow Table In this video, you will be able to crack WPA2 key using the Rainbow Table method. This method depends on combining the ESSID and password list and converting it to PMK, so you don't have to wait for each password to be converted to PMK and compare it with the handshake. It will compare all the passwords that are in the wordlist with the handshake. |
9. Cracking WPA/WPA2 Using Hashcat (GPU) In the previous videos, we were using the CPU to guess the AP password, but this time, we will use the GPU instead of the CPU because your GPU is more powerful than your CPU. We will do this using Hashcat. |
10. Cracking WPA/WPA2 Using Evil Twin Attack This is the most powerful method, because you will jam your target AP and broadcast a fake AP that has the same information of the target AP. They will be forced to connect to your fake AP, then a security recommendation page will pop up and ask them for the password, after which they will be forced to enter the key, then you will get the password. |
11. Getting the Username and Password of the Target Router In this video, you will be able to get the username and password of your target router, using the Routersploit tool that contains several exploits. |
7. Hacking WPA-Enterprise Wi-Fi Networks
1. WPA Enterprise - Theory Before diving into how hackers gain access to WPA-Enterprise networks, it's very important to understand what WPA-Enterprise networks are and how they work. |
2. Install the Required Tools In this lecture, you will install all the necessary tools required to perform your WPA-Enterprise attack. |
3. Creating a Fake Enterprise Network In this lecture, you will learn how to create your own fake WPA-Enterprise Wi-Fi access point. |
4. Crack the Hash - Hashcat In this video, you will learn how to crack the hash. |
8. Man in the Middle Attacks
1. Introduction This video introduces you to the section. |
2. Man in the Middle Attack Explained Before we get started with MITM attacks, we will cover what is MITM attack and the theory behind this attack. |
3. Gathering Information about Connected Clients In this video, you will be able to discover the connected clients and their IP and MAC addresses, using the Netdiscover tool. |
4. Gather Detailed Information about the Clients In this video, you will be able to gather detailed information about the connected clients, which will help you specify your target. |
5. MITM Attack Using (ARPspoof) In this video, you will be able to poison the ARP table in the target device by telling the router that 'I am the client' and telling the client that 'I am the router'. |
6. Capturing Login Credentials In this video, you will be able to capture any login information from any client, such as the email and password, using MITMF. |
7. Bypassing SSL Certificate In this video, you will be able to bypass the SSL certificate issue. |
8. Redirect Any Client to Any Website In this video, you will learn how to redirect any client from any website to another. You can redirect the target to a page that could have a malicious backdoor into it, or you can redirect the client from the trusted website to a fake page that has the same interface, so you will bypass the SSL issue and HSTS. |
9. Stealing the Cookies In this video, you will learn how to steal the cookies from the target browser and inject it into your browser, then you will be redirected to the target account without entering the email and password. |
10. Capturing a Screenshot from the Target Browser In this video, you will be able to capture a screenshot from the target browser so you will see what he is watching, chatting, browsing and more |
11. Injecting a keylogger into the target webpage In this video you will be able to inject a keylogger into the target browser, so you will be able to see what the target is typing, or his conversations. |
12. Capturing Images from Network Traffic In this video, you will be able to capture all the images from the target browser using the Driftnet tool. |
13. Injecting HTML File and Flipping the Images in the Target Browser In this video, you will be able to inject any HTML code or file into the target browser and be able to flip all the images 180 degrees in the target browser. |
14. Injecting JavaScript URL and Hooking the Clients with BeEF In this video, you will be able to inject any JavaScript file or code into the target browser and hook the clients with BeEF project. |
15. Stealing the Target Accounts with BeEF In this video, you will be able to steal the target social network accounts such as Facebook, Google, Yahoo, by showing the target a fake login prompt that asks him to renew his session. |
16. Having Fun with BeEF This video is only for entertainment, because you will be able to run some funny commands in the target browser. |
9. Fully Accessing the Connected Devices
1. Creating an Encrypted Backdoor In this video, you will be able to create an undetectable backdoor using the Veil-evasion tool, because if the target computer uses an antivirus, it will detect your backdoor and prevent it from executing. |
2. Testing the Backdoor in the Target Device In this video, you will be able to run your encrypted backdoor into the target computer, but before we do that, we will see how to listen for incoming connections. |
3. Creating a Fake Browser Update and Hacking Any Client In this video, you will be able to force your target to run your backdoor, by showing the target a fake update; once he installs it and runs it, he will be hacked. |
4. Interacting with the Target Computer (Part 1) In this video, you will learn how to interact with the target computer through Meterpreter command line. We will focus on the most useful commands to interact with the target machine. |
5. Interacting with the Target Computer (Part 2) In the second part, you will learn the most enjoyable commands that you can use in the target computer. |
10. Protect Your Wi-Fi Network from All the Previous Attacks
1. Protect Your Wi-Fi Access Point After learning about all these attacks, which could be launched against your Wi-Fi AP, now it's time to learn how to protect yourself against all these attacks. |
2. Detect ARP Poisoning Attack Using (XARP) In this video, you will be able to detect any MITM attack using the XARP program that tells you if somebody is trying to poison your ARP Table. |
3. Detect ARP Poisoning Attack (Wireshark) This video explains how you will be able to detect any ARP poisoning attack and if anybody is trying to scan your network, by analyzing the network traffic. |
4. Prevent Your ARP Table from Poisoning This video explains how to detect any ARP poisoning attack. In this video, you will be able to prevent your ARP Table from modifying, by changing the MAC address table from dynamic to static. |
5. Detect and Kill Any Meterpreter Session In this video, you will be able to detect any Meterpreter session on your Windows memory and kill it, by scanning the running services and processes on your Windows memory; you will be able to detect the encrypted backdoor. |
11. Extras
1. Disconnecting Paired Bluetooth Devices In this video, you will be able to disconnect any paired Bluetooth device, so first, we will scan for nearby Bluetooth devices, then we will send many packets to the target device. |