1. Setting Up The Lab
- Lab Overview & Needed Software
- Installing Kali 2020 As a Virtual Machine
- Creating & Using Snapshots
- Kali Linux Overview
- The Linux Terminal & Basic Commands
2. Network Basics
- Network Basics
- Connecting a Wireless Adapter To Kali
- MAC Address – What Is It & How To Change It
- Wireless Modes (Managed & Monitor mode)
3. Pre-Connection Attacks
- Packet Sniffing Basics Using Airodump-ng
- WiFi Bands – 2.4Ghz & 5Ghz Frequencies
- Targeted Packet Sniffing Using Airodump-ng
- Deauthentication Attack (Disconnecting Any Device From The Network)
4. Gaining Access
- Gaining Access Introduction
5. Gaining Access – WEP Cracking
- Theory Behind Cracking WEP Encryption
- Basic Case
- Associating With Target Network Using Fake Authentication Attack
- Packet Injection – ARP Request Reply Attack
- Packet Injection – Korek Chopchop Attack
- Packet Injection – Fragmentation Attack
6. Gaining Access – WPA/WPA2 Cracking
- Introduction to WPA / WPA2 Cracking
- Exploiting the WPS Feature
- How to Capture a Handshake
- Creating a Wordlist / Dictionary
- Cracking the Key Using a Wordlist Attack
- Cracking the Key Quicker using a Rainbow Table
- Cracking WPA/WPA2 Much Faster Using GPU
7. Gaining Access – Security & Mitigation
- Securing Your Network From The Above Attacks
- How to Configure Wireless Security Settings To Secure Your Network
8. Post Connection Attacks
- Post Connection Attacks Introduction
- Installing Windows As a Virtual machine
9. Post Connection Attacks – Information Gathering
- Discovering Connected Clients using netdiscover
- Gathering More Information Using Zenmap
- Gathering Even More Information Using Zenmap
10. Post Connections Attacks – Man In The Middle Attacks (MITM)
- ARP Poisoning Theory
- ARP Poisoning Using arpspoof
- Bettercap Basics
- ARP Poisoning Using Bettercap
- Spying on Network Devices (Capturing Passwords, Visited Websites…etc)
- Creating Custom Spoofing Script
- Understanding HTTPS & How to Bypass it
- Bypassing HTTPS
- Bypassing HSTS
- DNS Spoofing – Redirecting Requests From One Website To Another
- Injecting Javascript Code
- Wireshark – Basic Overview & How To Use It With MITM Attacks
- Wireshark – Sniffing & Analysing Data
- Wireshark – Using Filters, Tracing & Dissecting Packets
- Wireshark – Capturing Passwords & Anything Sent By Any Device In The Network
- Creating a Fake Access Point – Theory
- Creating a Fake AP Using Mana-Toolkit
11. Post Connection Attacks – Gaining Full Control Over Devices On The Same Network
- Installing Veil 3.1
- Veil Overview & Payloads Basics
- Generating An Undetectable Backdoor Using Veil 3
- Listening For Incoming Connections
- Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
- Creating a Fake Update & Hacking Any Client in the Network
- Meterpreter Basics – Interacting Wit Hacked Clients
12. ARP Poisoning Detection & Security
- Detecting ARP poisoning Attack
- Detecting Suspicious Activities using Wireshark