Oreilly - Learn Network Hacking From Scratch (WiFi and Wired)
by Zaid Sabih | Publisher: Packt Publishing | Release Date: April 2018 | ISBN: 9781789340013
Learn how to hack and protect both WiFi and wired networks like a pro.About This VideoThis course is divided into three main sections:pre-connection, gaining access and post connection.Learn how to launch powerful attacks detect them to protect yourself and your network against them.In DetailWelcome to this comprehensive course on network hacking! This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in the author's lab. The course is structured in a way that will take you through the basics of Linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks. This course will take you from total beginner to a more advanced level. All the attacks in this course are practical attacks that work against any wireless enabled device, so it does not matter if the device is a phone, tablet, laptop, or another device. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android, and so on.). Each attack is explained in a simple way first so that you understand how it actually works; first, you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.
- Chapter 1 : Introduction & Course Outline
- Introduction & Course Outline 00:03:36
- Chapter 2 : Preparation - Setting Up the Lab
- Installing Kali 2018 as a Virtual Machine 00:08:31
- Installing Windows as a Virtual machine 00:02:38
- Creating & Using Snapshots 00:06:08
- Kali Linux Overview 00:07:06
- Updating Sources & Installing Programs 00:04:39
- Chapter 3 : Network Basics
- Network Basics 00:03:09
- Connecting a Wireless Adapter to Kali 00:07:18
- MAC Address - What Is It & How to Change It 00:04:31
- Wireless Modes (Managed & Monitor mode) 00:05:03
- Enabling Monitor Mode Manually (2nd method) 00:02:37
- Enabling Monitor Mode Using airmon-ng (3rd method) 00:03:17
- Chapter 4 : Pre-Connection Attacks
- Packet Sniffing Basics Using Airodump-ng 00:05:17
- Targeted Packet Sniffing Using Airodump-ng 00:07:02
- Deauthentication Attack (Disconnecting Any Device from the Network) 00:04:52
- Creating a Fake Access Point – Theory 00:03:31
- Creating a Fake Access Point – Practical 00:10:08
- Creating a Fake AP Using Mana-Toolkit 00:09:50
- Chapter 5 : Gaining Access
- Gaining Access Introduction 00:01:16
- Chapter 6 : Gaining Access - WEP Cracking
- Theory behind Cracking WEP Encryption 00:03:04
- Basic Case 00:05:34
- Associating With Target Network Using Fake Authentication Attack 00:06:10
- Packet Injection - ARP Request Reply Attack 00:04:15
- Packet Injection - Korek Chopchop Attack 00:07:43
- Packet Injection - Fragmentation Attack 00:07:44
- Chapter 7 : Gaining Access - WPA/WPA2 Cracking
- What is WPA & How Does It Work? 00:01:57
- Exploiting the WPS Feature 00:06:43
- Theory behind Cracking WPA/WPA2 Encryption 00:02:16
- How to Capture a Handshake 00:04:29
- Creating a Wordlist / Dictionary 00:05:32
- Cracking the Key Using a Wordlist Attack 00:03:05
- Cracking the Key Quicker using a Rainbow Table 00:07:01
- Quicker Wordlist Attack using the GPU 00:06:28
- Chapter 8 : Gaining Access - Security & Mitigation
- How to Configure Wireless Security Settings to Secure Your Network 00:06:25
- Chapter 9 : Post Connection Attacks
- Post Connection Attacks Introduction 00:02:44
- Chapter 10 : Post Connection Attacks - Information Gathering
- Discovering Connected Clients using netdiscover 00:03:20
- Gathering More Information Using Autoscan 00:08:42
- Even More Detailed Information Gathering Using Nmap 00:10:04
- Chapter 11 : Post Connections Attacks - Man in the Middle Attacks (MITM)
- ARP Poisoning Theory 00:05:33
- ARP Poisoning Using arpspoof 00:05:51
- ARP Poisoning Using MITMf & Capturing Passwords Entered By Users on the Network 00:05:22
- Bypassing HTTPS / SSL 00:04:41
- Stealing Cookies - Session Hijacking 00:06:34
- DNS Spoofing - Redirecting Requests From One Website to Another 00:05:10
- Capturing Screen of Target & Injecting a Keylogger 00:05:07
- Injecting Javascript/HTML Code 00:06:43
- Hooking Clients to Beef & Stealing Passwords 00:09:56
- MITM - Using MITMf against Real Networks 00:09:09
- Wireshark - Basic Overview & How to Use It with MITM Attacks 00:09:09
- Wireshark - Sniffing Data & Analysing HTTP Traffic 00:08:01
- Wireshark - Capturing Passwords & Cookies Entered By Any Device in the Network 00:05:37
- Chapter 12 : Post Connection Attacks - Gaining Full Control over Devices on the Same Network
- Bonus - Installing Veil 3 00:07:50
- Bonus - Veil Overview & Payloads Basics 00:07:20
- Bonus - Generating an Undetectable Backdoor Using Veil 3 00:09:44
- Bonus - Listening For Incoming Connections 00:07:19
- Bonus - Using a Basic Delivery Method to Test the Backdoor & Hack Windows 10 00:07:13
- Creating a Fake Update & Hacking Any Client in the Network 00:09:01
- Meterpreter Basics - Interacting With Hacked Clients 00:05:35
- Chapter 13 : ARP Poisoning Detection & Security
- Detecting ARP Poisoning Attacks 00:05:11
- Detecting Suspicious Activities using Wireshark 00:05:51