17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.
Created by : Zaid Sabih, z Security Last updated : 5/2019 Language : English Caption (CC) : Included Torrent Contains : 158 Files, 15 Folders Course Source : https://www.udemy.com/course/wifi-hacking-penetration-testing-from-scratch/
What you'll learn
• 60+ detailed videos about practical networks attacks • Control connections of clients around you without knowing the password. • Crack WEP/WPA/WPA2 using a number of methods. • Hack any computer on the same network. • Intercept data and spy on all on the network • Gather detailed information about clients and networks like their OS, opened ports ...etc. • A number of practical attacks that can be used without knowing the key to the target network • ARP Spoofing/ARP Poisonning • Launch Various Man In The Middle attacks. • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc. • Detect ARP poisoning and protect your self and your network against it. • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc. • Combine individual attacks to launch even more powerful attacks.
Requirements
• Basic IT skills • No Linux, programming or hacking knowledge required. • Computer with a minimum of 4GB ram/memory • Operating System: Windows / OS X / Linux • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
Description
Welcome to my comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers, not only that but you'll also learn how to secure networks from hackers.
This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.
The Course is Divided into three main sections:
1. Pre-connection attacks : In this section you will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn how to control connections around you (ie: deny/allow devices from connecting to networks) even without knowing the password of the target network.
2. Gaining Access : Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network weather it uses WEP, WPA or even WPA2.
3. Post Connection attacks : Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over any client in your network! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.
All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.
Who this course is for :
• Anybody who is interested in learning about network penetration testing • Anybody interested into learning how to protect networks from hackers.
For More Udemy Free Courses >>> https://ftuforum.com/ For more Lynda and other Courses >>> https://www.freecoursesonline.me/ Our Forum for discussion >>> https://discuss.ftuforum.com/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help Team-FTU.txt
237 B
1. Chapter 1/1. Introduction & Course Outline.mp4
38.1 MB
1. Chapter 1/1. Introduction & Course Outline.vtt
4.9 KB
10. Post Connection Attacks - Information Gathering/1. Discovering Connected Clients using netdiscover.mp4
76 MB
10. Post Connection Attacks - Information Gathering/1. Discovering Connected Clients using netdiscover.vtt
8.9 KB
10. Post Connection Attacks - Information Gathering/1.1 04-post-connection-attacks.pdf.pdf
1.6 MB
10. Post Connection Attacks - Information Gathering/2. Gathering More Information Using Zenmap.mp4
52 MB
10. Post Connection Attacks - Information Gathering/2. Gathering More Information Using Zenmap.vtt
7.9 KB
10. Post Connection Attacks - Information Gathering/3. Gathering Even More Information Using Zenmap.mp4
63.3 MB
10. Post Connection Attacks - Information Gathering/3. Gathering Even More Information Using Zenmap.vtt
9.2 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/1. ARP Poisoning Theory.mp4
70.6 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/1. ARP Poisoning Theory.vtt
9.1 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/10. DNS Spoofing - Redirecting Requests From One Website To Another.mp4
101.9 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/10. DNS Spoofing - Redirecting Requests From One Website To Another.vtt
11.4 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/11. Injecting Javascript Code.mp4
78.3 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/11. Injecting Javascript Code.vtt
11.3 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/11.1 inject_beef.js.js
131 B
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/12. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4
80.7 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/12. Wireshark - Basic Overview & How To Use It With MITM Attacks.vtt
10.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/13. Wireshark - Sniffing & Analysing Data.mp4
83.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/13. Wireshark - Sniffing & Analysing Data.vtt
6.8 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/14. Wireshark - Using Filters, Tracing & Dissecting Packets.mp4
82.6 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/14. Wireshark - Using Filters, Tracing & Dissecting Packets.vtt
6.8 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.mp4
109.7 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.vtt
8.3 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/16. Creating a Fake Access Point - Theory.mp4
85.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/16. Creating a Fake Access Point - Theory.vtt
10 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/17. Creating a Fake AP Using Mana-Toolkit.mp4
105.9 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/17. Creating a Fake AP Using Mana-Toolkit.vtt
11.4 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/2. ARP Poisoning Using arpspoof.mp4
64.4 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/2. ARP Poisoning Using arpspoof.vtt
6.6 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/3. Bettercap Basics.mp4
73.6 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/3. Bettercap Basics.vtt
9.3 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/4. ARP Poisoning Using Bettercap.mp4
81.3 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/4. ARP Poisoning Using Bettercap.vtt
8.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/5. Spying on Network Devices (Capturing Passwords, Visited Websites...etc).mp4
70.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/5. Spying on Network Devices (Capturing Passwords, Visited Websites...etc).vtt
5.3 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/6. Creating Custom Spoofing Script.mp4
102 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/6. Creating Custom Spoofing Script.vtt
10.3 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/7. Understanding HTTPS & How to Bypass it.mp4
33.6 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/7. Understanding HTTPS & How to Bypass it.vtt
5.9 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/7.1 hstshijack.zip.zip
13.7 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/8. Bypassing HTTPS.mp4
77.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/8. Bypassing HTTPS.vtt
7.6 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/9. Bypassing HSTS.mp4
89.1 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/9. Bypassing HSTS.vtt
10.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1. Bonus - Installing Veil 3.1.mp4
41.6 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1. Bonus - Installing Veil 3.1.vtt
6.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1.1 Veil 3 Git Repo.html
100 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/2. Bonus - Veil Overview & Payloads Basics.mp4
10.3 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/2. Bonus - Veil Overview & Payloads Basics.vtt
8.8 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3. Bonus - Generating An Undetectable Backdoor Using Veil 3.mp4
14.9 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3. Bonus - Generating An Undetectable Backdoor Using Veil 3.vtt
10.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3.1 Another way of generating an undetectable backdoor.html
137 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/4. Bonus - Listening For Incoming Connections.mp4
9 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/4. Bonus - Listening For Incoming Connections.vtt
7.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/5. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4
13.4 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/5. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.vtt
8 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6. Creating a Fake Update & Hacking Any Client in the Network.mp4
19.6 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6. Creating a Fake Update & Hacking Any Client in the Network.vtt
10.2 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6.1 evilgrade-installation-commands-updated.txt.txt
859 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/7. Meterpreter Basics - Interacting Wit Hacked Clients.mp4
15 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/7. Meterpreter Basics - Interacting Wit Hacked Clients.vtt