Udemy - Network Hacking Continued - Intermediate to Advanced [FreeAllCourse]
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size1.5 GB
- Uploaded ByLMorningStar
- Downloads323
- Last checkedJun. 01st '20
- Date uploadedMay. 31st '20
- Seeders 29
- Leechers4
Infohash : 683C2A6D15286F3CAAEBF7ECEDD4DFE96ABBA780
Network Hacking Continued - Intermediate to Advanced
Learn advanced techniques to hack into WiFi & wired networks & write own python scripts to implement custom MITM attacks.
For More Paid Udemy Courses: FreeAllCourse.Com
What you'll learn?
# 80+ detailed videos on ADVANCED network hacking
# 2 methods to hack WPA2 enterprise networks
# 3 methods to hack captive portals (hotels & airport networks)
# Steal WPA/WPA2 password using evil twin attack.
# Crack WPA/WPA2 faster using GPU.
# Write custom scripts to implement your attack ideas.
# Bypass router-side security & run ARP spoofing attack without raising alarms.
# Unlock WPS on some routers even if its locked
# Disconnect multiple or all clients from their networks without knowing the key
# Bypass MAC filtering (both black & white lists).
# Discover & connect to hidden networks
# Crack more secure WEP implementation when SKA is used.
# Exploit WPS on more secure routers to get the WPA/WPA2 key.
# Understand how WPA/WPA2 enterprise work.
# Understand how a fake access points work
# Manually create fake access points
# Generate SSL certificates & use it to support HTTPS on apache2.
# Create a fake captive portal that acts exactly like a normal captive portal.
# Use huge wordlists to crack WPA/WPA2 without taking up disk space.
# Save WPA / WPA2 cracking progress.
# Bypass HTTPS & capture data manually.
# Analyse data flows and build own attacks.
# Run attacks against HTTPS websites.
# Inject Javascript / HTML code in HTTPS pages.
# Create trojans - combine any file (image/pdf) with an evil file.
# Replace files downloaded on the network with trojans.
# Write script to replace downloads with trojans on the fly.
Description
Created by Zaid Sabih, z Security
Last updated 1/2020
Audio : English
Caption : English [Auto-generated]
Files:
[FreeAllCourse.Com] Udemy - Network Hacking Continued - Intermediate to Advanced 0. Websites you may like- [FreeAllCourse.Com].url (0.1 KB)
- 1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.mp4 (22.0 MB)
- 1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.srt (9.0 KB)
- 2. Course Overview.mp4 (21.0 MB)
- 2. Course Overview.srt (7.3 KB)
- 1. Introduction to MITMproxy.mp4 (7.8 MB)
- 1. Introduction to MITMproxy.srt (5.1 KB)
- 1.1 MITMproxy Download Page.html (0.1 KB)
- 1.2 Post Connection - Analysing Data Flows.pdf (190.0 KB)
- 10. [Bonus] - Hacking Windows 10 Using A Fake Update.mp4 (11.6 MB)
- 10. [Bonus] - Hacking Windows 10 Using A Fake Update.srt (6.1 KB)
- 2. Using MITMproxy In Explicit Mode.mp4 (11.4 MB)
- 2. Using MITMproxy In Explicit Mode.srt (8.4 KB)
- 3. Analysing (Filtering & Highlighting) Flows.mp4 (11.8 MB)
- 3. Analysing (Filtering & Highlighting) Flows.srt (6.7 KB)
- 4. Intercepting Network Flows.mp4 (9.9 MB)
- 4. Intercepting Network Flows.srt (6.2 KB)
- 5. Modifying Responses & Injecting Javascript Manually.mp4 (23.0 MB)
- 5. Modifying Responses & Injecting Javascript Manually.srt (10.9 KB)
- 6. Intercepting & Modifying Responses In Transparent Mode.mp4 (16.2 MB)
- 6. Intercepting & Modifying Responses In Transparent Mode.srt (9.9 KB)
- 7. Editing Responses & Injecting BeEF's Code On The Fly.mp4 (23.0 MB)
- 7. Editing Responses & Injecting BeEF's Code On The Fly.srt (11.5 KB)
- 8. Editing Responses Automatically Based On Regex.mp4 (20.4 MB)
- 8. Editing Responses Automatically Based On Regex.srt (10.8 KB)
- 9. [Bonus] - Stealing Login Info Using Fake Login Prompt.mp4 (19.1 MB)
- 9. [Bonus] - Stealing Login Info Using Fake Login Prompt.srt (9.7 KB)
- 1. Introduction to MITM Scripts.mp4 (13.7 MB)
- 1. Introduction to MITM Scripts.srt (7.6 KB)
- 1.1 Post Connection - Writing Custom Scripts.pdf (211.3 KB)
- 1.2 MITMproxy Scripting Wiki Page.html (0.1 KB)
- 10. Executing Bash Commands & Calling Trojan Factory From Our Script.mp4 (18.7 MB)
- 10. Executing Bash Commands & Calling Trojan Factory From Our Script.srt (10.5 KB)
- 11. Using Variables & More Complex Conditions.mp4 (17.0 MB)
- 11. Using Variables & More Complex Conditions.srt (10.9 KB)
- 12. Converting Downloads To Trojans On The Fly.mp4 (23.2 MB)
- 12. Converting Downloads To Trojans On The Fly.srt (13.1 KB)
- 12.1 basic-v3.py (0.5 KB)
- 13. Configuring The Trojan Factory's MITMproxy Script.mp4 (16.4 MB)
- 13. Configuring The Trojan Factory's MITMproxy Script.srt (9.4 KB)
- 14. Using The Trojan Factory MITMproxy Script.mp4 (18.8 MB)
- 14. Using The Trojan Factory MITMproxy Script.srt (10.3 KB)
- 2. Capturing & Printing RequestsResponses.mp4 (18.2 MB)
- 2. Capturing & Printing RequestsResponses.srt (10.7 KB)
- 2.1 basic.py (0.1 KB)
- 3. Filtering Flows & Extracting Useful Data.mp4 (27.4 MB)
- 3. Filtering Flows & Extracting Useful Data.srt (12.1 KB)
- 4. Using Conditions To Execute Code On Useful Flows.mp4 (26.8 MB)
- 4. Using Conditions To Execute Code On Useful Flows.srt (11.9 KB)
- 5. Generating Custom HTTP Responses.mp4 (19.3 MB)
- 5. Generating Custom HTTP Responses.srt (10.6 KB)
- 6. Testing Script Locally.mp4 (18.3 MB)
- 6. Testing Script Locally.srt (10.3 KB)
- 6.1 basic-v2.py (0.3 KB)
- 7. Generating Trojans - Installing The Trojan Factory.mp4 (15.9 MB)
- 7. Generating Trojans - Installing The Trojan Factory.srt (8.3 KB)
- 7.1 Trojan Factory Git Repo.html (0.1 KB)
- 8. Generating Trojans - Converting Any File (egimage) To a Trojan.mp4 (24.3 MB)
- 8. Generating Trojans - Converting Any File (egimage) To a Trojan.srt (12.9 KB)
- 9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.mp4 (14.9 MB)
- 9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.srt (9.1 KB)
- 1. Bypassing HTTPS With MITMproxy.mp4 (16.3 MB)
- 1. Bypassing HTTPS With MITMproxy.srt (8.2 KB)
- 1.1 MITMProxy Complex Scripts.html (0.1 KB)
- 1.2 sslstrip.py (2.4 KB)
- 2. Replacing HTTPS Downloads.mp4 (12.7 MB)
- 2. Replacing HTTPS Downloads.srt (6.4 KB)
- 3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.mp4 (13.9 MB)
- 3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.srt (8.0 KB)
- 4. Securing Systems From The Above Post Connection Attacks.mp4 (20.5 MB)
- 4. Securing Systems From The Above Post Connection Attacks.srt (6.7 KB)
- 1. Bonus Lecture - What's Next.html (7.5 KB)
- 1. Pre-connection Attacks Overview.mp4 (7.2 MB)
- 1. Pre-connection Attacks Overview.srt (2.8 KB)
- 1.1 Pre-Connection Attacks.pdf (125.6 KB)
- 2. Spoofing Mac Address Manually.mp4 (6.2 MB)
- 2. Spoofing Mac Address Manually.srt (5.0 KB)
- 3. Targeting 5 GHz Networks.mp4 (13.0 MB)
- 3. Targeting 5 GHz Networks.srt (8.5 KB)
- 3.1 Best Wireless Adapters For Hacking.html (0.1 KB)
- 3.1 website Selling Supported Wireless Adapters.html (0.1 KB)
- 3.2 Best Wireless Adapters For Hacking.html (0.1 KB)
- 3.2 website Selling Supported Wireless Adapters.html (0.1 KB)
- 4. Deauthenticating a Client From Protected WiFi Networks.mp4 (16.3 MB)
- 4. Deauthenticating a Client From Protected WiFi Networks.srt (9.7 KB)
- 5. Deauthenticating Multiple Clients From Protected WiFi Networks.mp4 (17.3 MB)
- 5. Deauthenticating Multiple Clients From Protected WiFi Networks.srt (10.7 KB)
- 6. Deauthenticating All Clients From Protected WiFi Network.mp4 (13.6 MB)
- 6. Deauthenticating All Clients From Protected WiFi Network.srt (7.8 KB)
- 1. Gaining Access Ove
Code:
- udp://explodie.org:6969/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.kamigami.org:2710/announce
- https://tracker.nanoha.org:443/announce
- udp://retracker.akado-ural.ru:80/announce
- udp://opentor.org:2710/announce
- http://h4.trakx.nibba.trade:80/announce
- udp://xxxtor.com:2710/announce
- udp://opentracker.i2p.rocks:6969/announce
- udp://tracker.zerobytes.xyz:1337/announce
- https://tracker.nitrix.me:443/announce
- https://t1.leech.ie:443/announce
- udp://open.stealth.si:80/announce