Filename Size ~Get Your Files Here !/1 - Introduction to Bettercap/1 - Introduction.html 3.3 KB ~Get Your Files Here !/1 - Introduction to Bettercap/1 -Introduction of the Bettercap.mp4 43.2 MB ~Get Your Files Here !/1 - Introduction to Bettercap/2 - Basic Usage and Overview.html 13.7 KB ~Get Your Files Here !/1 - Introduction to Bettercap/2 - Installing Bettercap.html 10.3 KB ~Get Your Files Here !/1 - Introduction to Bettercap/2 - What is Bettercap.html 15.4 KB ~Get Your Files Here !/1 - Introduction to Bettercap/2 -How to Boot the kali linux live to use the Bettercap in the Vmware workstation.mp4 263.5 MB ~Get Your Files Here !/10 - Host Discovery and Enumeration/1 - Network Device Discovery.html 11.7 KB ~Get Your Files Here !/10 - Host Discovery and Enumeration/1 - OS Detection.html 11.5 KB ~Get Your Files Here !/10 - Host Discovery and Enumeration/1 - Port Scanning.html 10.6 KB ~Get Your Files Here !/11 - Social Engineering Attacks/1 - Evil Twin Attacks.html 10.3 KB ~Get Your Files Here !/11 - Social Engineering Attacks/1 - Fake Captive Portals.html 14 KB ~Get Your Files Here !/12 - Automation and Custom Scripting/1 - Caplet Scripting for Automation.html 11.5 KB ~Get Your Files Here !/12 - Automation and Custom Scripting/1 - Extensible Framework for Custom Modules.html 12.3 KB ~Get Your Files Here !/12 - Automation and Custom Scripting/1 - Interactive CLI for Real-Time Attacks.html 12.1 KB ~Get Your Files Here !/13 - Monitoring and Alerts/1 - Custom Alert System.html 13.5 KB ~Get Your Files Here !/13 - Monitoring and Alerts/1 - Live Network Monitoring.html 11.9 KB ~Get Your Files Here !/14 - Advanced Features/1 - Cross-Platform Support.html 11.5 KB ~Get Your Files Here !/14 - Advanced Features/1 - Custom Packet Crafting.html 14.4 KB ~Get Your Files Here !/14 - Advanced Features/1 - Integration with Third-Party Tools.html 10.8 KB ~Get Your Files Here !/15 - Wi-Fi Jamming and Key Cracking/1 - Deauthentication Packet Injection.html 14.2 KB ~Get Your Files Here !/15 - Wi-Fi Jamming and Key Cracking/1 - Rogue AP Creation.html 10.3 KB ~Get Your Files Here !/16 - MITM Over Encrypted Protocols/1 - Handling SSLTLS Traffic.html 9.2 KB ~Get Your Files Here !/16 - MITM Over Encrypted Protocols/1 - HTTPS Man-in-the-Middle (MITM).html 12 KB ~Get Your Files Here !/17 - Wi-Fi Password Cracking/1 - Exporting Handshakes for Cracking.html 11.4 KB ~Get Your Files Here !/17 - Wi-Fi Password Cracking/1 - WPAWPA2 Handshake Capture.html 9.2 KB ~Get Your Files Here !/18 - Custom DNS Configuration/1 - Setting Custom DNS Records.html 12.5 KB ~Get Your Files Here !/19 - IPv6 Support and Attacks/1 - IPv6 MITM Attacks.html 10.8 KB ~Get Your Files Here !/19 - IPv6 Support and Attacks/1 - Router Advertisement Spoofing.html 12.2 KB ~Get Your Files Here !/2 - Network Sniffing and Packet Manipulation/1 - Capturing Live Network Traffic.html 14.2 KB ~Get Your Files Here !/2 - Network Sniffing and Packet Manipulation/1 - HTTPHTTPS Interception and Modification.html 14.8 KB ~Get Your Files Here !/2 - Network Sniffing and Packet Manipulation/1 - SSLTLS Stripping.html 14.7 KB ~Get Your Files Here !/20 - Event Logging and Reporting/1 - Generate logs and reports for auditing activities.html 12.1 KB ~Get Your Files Here !/21 - Advanced Session Hijacking/1 - Control Over Hijacked Sessions (Logout or Redirection).html 11.7 KB ~Get Your Files Here !/21 - Advanced Session Hijacking/1 - Cookie Injection into Intercepted HTTP Sessions.html 12 KB ~Get Your Files Here !/22 - Rogue DHCP Server/1 - Assigning Malicious Configurations to Devices.html 12.8 KB ~Get Your Files Here !/22 - Rogue DHCP Server/1 - Launching a Fake DHCP Server.html 11 KB ~Get Your Files Here !/23 - Traffic Exfiltration/1 - Automated Reporting for Data Exfiltration.html 14.6 KB ~Get Your Files Here !/23 - Traffic Exfiltration/1 - Extracting Sensitive Data from Captured Packets.html 11.5 KB ~Get Your Files Here !/24 - Hardware Integration/1 - External Antennas or Wireless Cards for Extended Range.html 7.9 KB ~Get Your Files Here !/24 - Hardware Integration/1 - Integration with Raspberry Pi for Portable Attack Setups.html 8.9 KB ~Get Your Files Here !/25 - Real-Time Device Interaction/1 - Remotely Manipulating Connected Devices.html 9.2 KB ~Get Your Files Here !/25 - Real-Time Device Interaction/1 - Sending Custom Commands to Devices.html 9.1 KB ~Get Your Files Here !/26 - Full Protocol Support/1 - Intercepting and Analyzing SIP (VoIP) Protocol.html 13.7 KB ~Get Your Files Here !/26 - Full Protocol Support/1 - Intercepting and Analyzing SMB Protocol.html 8.1 KB ~Get Your Files Here !/26 - Full Protocol Support/1 - Intercepting and Manipulating FTP Protocol.html 12.9 KB ~Get Your Files Here !/27 - Persistence and Backdoor Creation/1 - Command and Control (C2) Interaction.html 12.5 KB ~Get Your Files Here !/27 - Persistence and Backdoor Creation/1 - Installing Persistent Backdoors on Devices.html 11.9 KB ~Get Your Files Here !/28 - Encrypted Communication Support/1 - Handling HTTPS Traffic with Custom SSLTLS Certificates.html 12.8 KB ~Get Your Files Here !/29 - Attack Simulation for Security Testing/1 - Simulating Real-World Attacks.html 13.8 KB ~Get Your Files Here !/29 - Attack Simulation for Security Testing/1 - Vulnerability Assessments for Networks and Devices.html 13.5 KB ~Get Your Files Here !/3 - DNS Spoofing and ARP Spoofing/1 - DNS Spoofing.html 12.8 KB ~Get Your Files Here !/30 - Custom Packet Crafting/1 - Crafting Custom Packets for Manipulation.html 13.6 KB ~Get Your Files Here !/31 - Wi-Fi Jamming and Deauthentication Attacks/1 - Deauthentication Packet Injection.html 13.1 KB ~Get Your Files Here !/31 - Wi-Fi Jamming and Deauthentication Attacks/1 - Rogue AP Creation for Wi-Fi Jamming.html 11.4 KB ~Get Your Files Here !/32 - Wi-Fi Security Auditing/1 - Assessing Wi-Fi Encryption Strength (WEP, WPA, WPA2).html 9.8 KB ~Get Your Files Here !/32 - Wi-Fi Security Auditing/1 - Detection of WPS-Enabled Networks.html 12.3 KB ~Get Your Files Here !/4 - Wi-Fi Hacking and Jamming/1 - AP Spoofing (Evil Twin).html 12.5 KB ~Get Your Files Here !/4 - Wi-Fi Hacking and Jamming/1 - Deauthentication Attacks (Wi-Fi Jamming).html 7.8 KB ~Get Your Files Here !/4 - Wi-Fi Hacking and Jamming/1 - Wi-Fi Network Scanning.html 9.4 KB ~Get Your Files Here !/4 - Wi-Fi Hacking and Jamming/1 - WPAWPA2 Handshake Capture.html 9.5 KB ~Get Your Files Here !/5 - BLE (Bluetooth Low Energy) Hacking/1 - Advertising Spoofing.html 13.2 KB ~Get Your Files Here !/5 - BLE (Bluetooth Low Energy) Hacking/1 - BLE Device Discovery.html 12.2 KB ~Get Your Files Here !/5 - BLE (Bluetooth Low Energy) Hacking/1 - BLE Service Manipulation.html 12.6 KB ~Get Your Files Here !/6 - Network Protocol Attacks/1 - DHCP Spoofing.html 12.9 KB ~Get Your Files Here !/6 - Network Protocol Attacks/1 - ICMP Redirects.html 9.9 KB ~Get Your Files Here !/6 - Network Protocol Attacks/1 - TCPUDP Packet Injection.html 11.2 KB ~Get Your Files Here !/7 - Proxy and Traffic Manipulation/1 - HTTPHTTPS Proxy for Traffic Redirection.html 12.2 KB ~Get Your Files Here !/7 - Proxy and Traffic Manipulation/1 - Payload Injection.html 12.9 KB ~Get Your Files Here !/8 - Credential Harvesting/1 - Capturing Login Credentials.html 12.6 KB ~Get Your Files Here !/8 - Credential Harvesting/1 - Session Hijacking.html 13.2 KB ~Get Your Files Here !/9 - DNS and Protocol Attacks/1 - DNS Poisoning.html 11.6 KB ~Get Your Files Here !/9 - DNS and Protocol Attacks/1 - mDNSLLMNR Spoofing.html 10.9 KB ~Get Your Files Here !/Bonus Resources.txt 386 B