Network Hacking (WiFi and Wired)

1. Setting Up The Lab

  • Lab Overview & Needed Software
  • Installing Kali 2020 As a Virtual Machine
  • Creating & Using Snapshots
  • Kali Linux Overview
  • The Linux Terminal & Basic Commands

2. Network Basics

  • Network Basics
  • Connecting a Wireless Adapter To Kali
  • MAC Address – What Is It & How To Change It
  • Wireless Modes (Managed & Monitor mode)

3. Pre-Connection Attacks

  • Packet Sniffing Basics Using Airodump-ng
  • WiFi Bands – 2.4Ghz & 5Ghz Frequencies
  • Targeted Packet Sniffing Using Airodump-ng
  • Deauthentication Attack (Disconnecting Any Device From The Network)

4. Gaining Access

  • Gaining Access Introduction

5. Gaining Access – WEP Cracking

  • Theory Behind Cracking WEP Encryption
  • Basic Case
  • Associating With Target Network Using Fake Authentication Attack
  • Packet Injection – ARP Request Reply Attack
  • Packet Injection – Korek Chopchop Attack
  • Packet Injection – Fragmentation Attack

6. Gaining Access – WPA/WPA2 Cracking

  • Introduction to WPA / WPA2 Cracking
  • Exploiting the WPS Feature
  • How to Capture a Handshake
  • Creating a Wordlist / Dictionary
  • Cracking the Key Using a Wordlist Attack
  • Cracking the Key Quicker using a Rainbow Table
  • Cracking WPA/WPA2 Much Faster Using GPU

7. Gaining Access – Security & Mitigation

  • Securing Your Network From The Above Attacks
  • How to Configure Wireless Security Settings To Secure Your Network

8. Post Connection Attacks

  • Post Connection Attacks Introduction
  • Installing Windows As a Virtual machine

9. Post Connection Attacks – Information Gathering

  • Discovering Connected Clients using netdiscover
  • Gathering More Information Using Zenmap
  • Gathering Even More Information Using Zenmap

10. Post Connections Attacks – Man In The Middle Attacks (MITM)

  • ARP Poisoning Theory
  • ARP Poisoning Using arpspoof
  • Bettercap Basics
  • ARP Poisoning Using Bettercap
  • Spying on Network Devices (Capturing Passwords, Visited Websites…etc)
  • Creating Custom Spoofing Script
  • Understanding HTTPS & How to Bypass it
  • Bypassing HTTPS
  • Bypassing HSTS
  • DNS Spoofing – Redirecting Requests From One Website To Another
  • Injecting Javascript Code
  • Wireshark – Basic Overview & How To Use It With MITM Attacks
  • Wireshark – Sniffing & Analysing Data
  • Wireshark – Using Filters, Tracing & Dissecting Packets
  • Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network
  • Creating a Fake Access Point – Theory
  • Creating a Fake AP Using Mana-Toolkit

11. Post Connection Attacks – Gaining Full Control Over Devices On The Same Network

  • Installing Veil 3.1
  • Veil Overview & Payloads Basics
  • Generating An Undetectable Backdoor Using Veil 3
  • Listening For Incoming Connections
  • Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
  • Creating a Fake Update & Hacking Any Client in the Network
  • Meterpreter Basics – Interacting Wit Hacked Clients

12. ARP Poisoning Detection & Security

  • Detecting ARP poisoning Attack
  • Detecting Suspicious Activities using Wireshark
Menu