Introduction |
|
Teaser – Hacking a Windows 10 Computer & Accessing Their Webcam |
|
00:07:00 |
|
Course Overview |
|
00:06:00 |
Back To Basics/Pre-Connection Attacks |
|
Pre-connection Attacks Overview |
|
00:02:00 |
|
Spoofing Mac Address Manually |
|
00:04:00 |
|
Targeting 5 GHz Networks |
|
00:07:00 |
|
Deauthenticating a Client From Protected WiFi Networks |
|
00:07:00 |
|
Deauthenticating Multiple Clients From Protected WiFi Networks |
|
00:08:00 |
|
Deauthenticating All Clients From Protected WiFi Network |
|
00:06:00 |
Gaining Access |
|
Gaining Access Overview |
|
00:03:00 |
|
Discovering Names of Hidden Networks |
|
00:08:00 |
|
Connecting To Hidden Networks |
|
00:05:00 |
|
Bypassing Mac Filtering (Blacklists & Whitelists) |
|
00:09:00 |
|
Cracking SKA WEP Network |
|
00:09:00 |
|
Securing Systems From The Above Attacks |
|
00:03:00 |
Gaining Access - Captive Portals |
|
Sniffing Captive Portal Login Information In Monitor Mode |
|
00:10:00 |
|
Sniffing Captive Portal Login Information Using ARP Spoofing |
|
00:09:00 |
|
Creating a Fake Captive Portal – Introduction |
|
00:05:00 |
|
Creating Login Page – Cloning a Login Page |
|
00:07:00 |
|
Creating Login Page – Fixing Relative Links |
|
00:07:00 |
|
Creating Login Page – Adding Form Tag |
|
00:08:00 |
|
Creating Login Page – Adding Submit Button |
|
00:07:00 |
|
Preparing Computer To Run Fake Captive Portal |
|
00:08:00 |
|
Starting The Fake Captive Portal |
|
00:12:00 |
|
Redirecting Requests To Captive Portal Login Page |
|
00:12:00 |
|
Generating Fake SSL Certificate |
|
00:06:00 |
|
Enabling SSL/HTTPS On Webserver |
|
00:08:00 |
|
Sniffing & Analysing Login Credentials |
|
00:06:00 |
Gaining Access - WPA/WPA2 Cracking - Exploiting WPS |
|
Exploiting WPS – Introduction |
|
00:02:00 |
|
Bypassing “Failed to associate” Issue |
|
00:08:00 |
|
Bypassing 0x3 and 0x4 Errors |
|
00:08:00 |
|
WPS Lock – What Is It & How To Bypass It |
|
00:07:00 |
|
Unlocking WPS |
|
00:09:00 |
Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack |
|
Advanced Wordlist Attacks – Introduction |
|
00:02:00 |
|
Saving Aircrack-ng Cracking Progress |
|
00:10:00 |
|
Using Huge Wordlists With Aircrack-ng Without Wasting Storage |
|
00:08:00 |
|
Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage |
|
00:10:00 |
|
Cracking WPA/WPA2 Much Faster Using GPU – Part 1 |
|
00:07:00 |
|
Cracking WPA/WPA2 Much Faster Using GPU – Part 2 |
|
00:11:00 |
Gaining Access - WPA/WPA Cracking - Evil Twin Attack |
|
What is It & How it Works |
|
00:07:00 |
|
Installing Needed Software |
|
00:08:00 |
|
Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing |
|
00:10:00 |
|
Debugging & Fixing Login Interface |
|
00:12:00 |
Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise |
|
What is WPA/WPA2 Enterprise & How it Works |
|
00:05:00 |
|
How To Hack WPA/WPA2 Enterprise |
|
00:07:00 |
|
Stealing Login Credentials |
|
00:08:00 |
|
Cracking Login Credentials |
|
00:07:00 |
|
Securing Systems From The Above Gaining Access Attacks |
|
00:05:00 |
Post Connection Attacks |
|
Post Connection Attacks Overview |
|
00:04:00 |
|
Ettercap – Basic Overview |
|
00:07:00 |
|
Ettercap – ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords |
|
00:10:00 |
|
Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites |
|
00:13:00 |
|
Automatically ARP Poisoning New Clients |
|
00:07:00 |
|
DNS Spoofing Using Ettercap |
|
00:06:00 |
|
Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms |
|
00:09:00 |
Post Connection Attacks - Analysing Data Flows & Running Custom Attacks |
|
MITMproxy – What is It & How To Install It |
|
00:04:00 |
|
Using MITMproxy In Explicit Mode |
|
00:07:00 |
|
Analysing (Filtering & Highlighting) Flows |
|
00:05:00 |
|
Intercepting Network Flows |
|
00:05:00 |
|
Modifying Responses & Injecting Javascript Manually |
|
00:09:00 |
|
Intercepting & Modifying Responses In Transparent Mode |
|
00:08:00 |
|
Editing Responses & Injecting BeEF’s Code On The Fly |
|
00:09:00 |
|
Editing Responses Automatically Based On Regex |
|
00:09:00 |
|
Stealing Login Info Using Fake Login Promo |
|
00:07:00 |
|
[Bonus] – Hacking Windows 10 Using A Fake Update |
|
00:05:00 |
Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks |
|
What Do Mean By MITM Scripts? |
|
00:06:00 |
|
Capturing & Printing Requests/Responses |
|
00:08:00 |
|
Filtering Flows & Extracting Useful Data |
|
00:09:00 |
|
Using Conditions To Execute Code On Useful Flows |
|
00:10:00 |
|
Generating Custom HTTP Responses |
|
00:09:00 |
|
Testing Script Locally |
|
00:09:00 |
|
Generating Trojans – Installing The Trojan Factory |
|
00:06:00 |
|
Generating Trojans – Converting Any File (eg: mage) To a Trojan |
|
00:10:00 |
|
Testing Script On Remote Computer To Replace Downloads With a Generic Trojan |
|
00:07:00 |
|
Executing Bash Commands & Calling Trojan Factory From Our Script |
|
00:09:00 |
|
Using Variables & More Complex Conditions |
|
00:09:00 |
|
Converting Downloads To Trojans On The Fly |
|
00:10:00 |
|
Configuring The Trojan Factory’s MITMproxy Script |
|
00:08:00 |
|
Using The Trojan Factory MITMproxy Script |
|
00:08:00 |
Post-Connection Attacks - Doing All Of The Above On HTTPS Websites |
|
Bypassing HTTPS With MITMproxy |
|
00:06:00 |
|
Replacing Downloads From HTTPS |
|
00:05:00 |
|
Injecting Data (Javascript, HTML elements …etc) In HTTPS Websites |
|
00:06:00 |
|
Securing Systems From The Above Post Connection Attacks |
|
00:06:00 |