Register for FREE and start learning Join today

1: Teaser – Converting Downloads To Trojans On The Fly & Hacking

5min

Hide

This transcript is also available as a PDF download within the files tab.

Converting Downloads To Trojans On The Fly & Hacking Windows

Hello and welcome. My name is Zaid. I’m an ethical hacker, a computer scientist, and I’ll be your instructor in this course.

As mentioned in the course requirements, you need to finish the network hacking section of my general ethical hacking course or finish my network hacking course before starting this course. This is because this course builds up on what you learn in these courses. So the main sections in discourse have similar titles to the titles used in the other courses. That’s because like I said, it builds up on what you learn in these courses, but the content in here is more advanced. So on the first section, the pre connection section, we’re going to be revisiting the preconstruction attacks and we’re going to build up on what you learn to run more advanced attacks. So you are going to learn how to change your Mac address manually so you can change it on any device that supports that. Without relying on any tools, you’re going to learn how to extend the pre-connection attacks that you know so far and run them against five gigahertz clients and five gigahertz networks.

And you’ll also gonna learn how to extend the d authentication attack and target multiple computers and multiple networks at the same time. Once done with that, we’re going to move to the gaining access section. In this section, we’re gonna talk about how to gain access to various types of networks and various types of encryptions. Now by now, you know some basic methods to gain access to Web WPA and WPA two, but in this course, before we talk about the advanced methods to do that, I’m going to show you how to bypass some security implementations that’ll prevent you from even trying anything against these networks. So you’re going to learn how to discover the names of hidden networks, how to run the attacks against them, and how to bypass Mac filtering, whether it’s implemented using a black list or using a white list.

Once done with that, we’re gonna move to cracking Wep, WPA and WPA2. But in each of these sections, we’re going to be covering new, more advanced attacks that will either allow you to get the password quicker, or they’ll allow you to bypass some security features implemented by the router. Or they’ll enhance your attack and allow you to target even more secure networks. In this course we’ll also going to cover the WPA and WPA2 enterprise, which we never spoke about before. These are similar to secure networks implemented in colleges and companies where there is an encryption used and even when people connect to the network they have to put a username and a password. Not only that, but we’ll also cover captive portals. So these are similar to networks used in hotels and in airports where there is no encryption used.

But once you connect you have to put a username and password and the section, I’m also going to show you how to manually create fake access points. We’re going to break that down into its smaller components and then combine it altogether to create a fake access point that looks like any other normal wifi network. So we are going to understand exactly how fake access points work and then I’m going to show you how to use it to gain access to the WPA and WPA2 networks without running any guessing. And without doing a brute force attack. We’ll also learn how to use that to gain access to cap the photos and you’ll learn how to use it with any other scenario that you think have once done with this. We’re going to move to the post connection at tax section and the section you’re going to learn a number of attacks that you can do after connecting to the network.

So all of the attacks that are you’re gonna to learn here will work against both Wifi and wired networks. In here you’re going to learn how to become demand and the middle use an arp spoofing, how to bypass https and snips sensitive data, how to do DNS spoofing, all of which you already know what you’re going to learn how to do this manually without relying on scripts like man in the middle life. So you’re going to understand how each of these components work and you’ll be able to adapt this to a number of scenarios regardless of how you become the man in the middle, whether you became the man in the middle using an arp spoof and get tagged or using a fake access point or using any other method. Not only that, but I’m also going to show you how to properly analyze the flows that flow in your network, and I’m going to show you how to start creating your own attacks and write scripts that will automatically execute your own ideas and your own attacks. So by the end of the section, if you just have an idea of an attack and there is no tool at all that does that attack, you’re going to know how to first of all, analyse how the traffic flows and then think of how you’re going to implement this attack and you’re also going to have the skills to literally write a script that will execute this attack for you. At the end of each of these sections, we’re going to talk about the security aspect and how to secure yourself and your systems from these attacks.

  • Converting Downloads To Trojans On The Fly & Hacking

You must to access notes.

About the expert

Zaid Sabih

Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

See more from Zaid Sabih