1: Teaser – Converting Downloads To Trojans On The Fly & Hacking
5minThis transcript is also available as a PDF download within the files tab.
Converting Downloads To Trojans On The Fly & Hacking Windows
Hello and welcome. My name is Zaid. I’m an ethical hacker, a computer scientist, and I’ll be your instructor in this course.
As mentioned in the course requirements, you need to finish the network hacking section of my general ethical hacking course or finish my network hacking course before starting this course. This is because this course builds up on what you learn in these courses. So the main sections in discourse have similar titles to the titles used in the other courses. That’s because like I said, it builds up on what you learn in these courses, but the content in here is more advanced. So on the first section, the pre connection section, we’re going to be revisiting the preconstruction attacks and we’re going to build up on what you learn to run more advanced attacks. So you are going to learn how to change your Mac address manually so you can change it on any device that supports that. Without relying on any tools, you’re going to learn how to extend the pre-connection attacks that you know so far and run them against five gigahertz clients and five gigahertz networks.
And you’ll also gonna learn how to extend the d authentication attack and target multiple computers and multiple networks at the same time. Once done with that, we’re going to move to the gaining access section. In this section, we’re gonna talk about how to gain access to various types of networks and various types of encryptions. Now by now, you know some basic methods to gain access to Web WPA and WPA two, but in this course, before we talk about the advanced methods to do that, I’m going to show you how to bypass some security implementations that’ll prevent you from even trying anything against these networks. So you’re going to learn how to discover the names of hidden networks, how to run the attacks against them, and how to bypass Mac filtering, whether it’s implemented using a black list or using a white list.
Once done with that, we’re gonna move to cracking Wep, WPA and WPA2. But in each of these sections, we’re going to be covering new, more advanced attacks that will either allow you to get the password quicker, or they’ll allow you to bypass some security features implemented by the router. Or they’ll enhance your attack and allow you to target even more secure networks. In this course we’ll also going to cover the WPA and WPA2 enterprise, which we never spoke about before. These are similar to secure networks implemented in colleges and companies where there is an encryption used and even when people connect to the network they have to put a username and a password. Not only that, but we’ll also cover captive portals. So these are similar to networks used in hotels and in airports where there is no encryption used.
But once you connect you have to put a username and password and the section, I’m also going to show you how to manually create fake access points. We’re going to break that down into its smaller components and then combine it altogether to create a fake access point that looks like any other normal wifi network. So we are going to understand exactly how fake access points work and then I’m going to show you how to use it to gain access to the WPA and WPA2 networks without running any guessing. And without doing a brute force attack. We’ll also learn how to use that to gain access to cap the photos and you’ll learn how to use it with any other scenario that you think have once done with this. We’re going to move to the post connection at tax section and the section you’re going to learn a number of attacks that you can do after connecting to the network.
So all of the attacks that are you’re gonna to learn here will work against both Wifi and wired networks. In here you’re going to learn how to become demand and the middle use an arp spoofing, how to bypass https and snips sensitive data, how to do DNS spoofing, all of which you already know what you’re going to learn how to do this manually without relying on scripts like man in the middle life. So you’re going to understand how each of these components work and you’ll be able to adapt this to a number of scenarios regardless of how you become the man in the middle, whether you became the man in the middle using an arp spoof and get tagged or using a fake access point or using any other method. Not only that, but I’m also going to show you how to properly analyze the flows that flow in your network, and I’m going to show you how to start creating your own attacks and write scripts that will automatically execute your own ideas and your own attacks. So by the end of the section, if you just have an idea of an attack and there is no tool at all that does that attack, you’re going to know how to first of all, analyse how the traffic flows and then think of how you’re going to implement this attack and you’re also going to have the skills to literally write a script that will execute this attack for you. At the end of each of these sections, we’re going to talk about the security aspect and how to secure yourself and your systems from these attacks.
You must Login to access notes.
All videos in this course
Lessons
- log in to buy this course and get access 1: Teaser - Converting Downloads To Trojans On The Fly & Hacking 5min
- log in to buy this course and get access 2: Course Overview (Preview) 7min
- log in to buy this course and get access 3: Pre-connection Attacks Overview 2min
- log in to buy this course and get access 4: Spoofing Mac Address Manually 3min
- log in to buy this course and get access 5: Targeting 5 GHz Networks 7min
- log in to buy this course and get access 6: Deauthenticating a Client From Protected WiFi Networks 7min
- log in to buy this course and get access 7: Deauthenticating Multiple Clients From Protected WiFi Networks 8min
- log in to buy this course and get access 8: Deauthenticating All Clients From Protected WiFi Network 6min
- log in to buy this course and get access 9: Gaining Access Overview (Preview) 2min
- log in to buy this course and get access 10: Discovering Names of Hidden Networks 8min
- log in to buy this course and get access 11: Connecting To Hidden Networks 5min
- log in to buy this course and get access 12: Bypassing Mac Filtering (Blacklists & Whitelists) 9min
- log in to buy this course and get access 13: Cracking SKA WEP NetworkFile 9min
- log in to buy this course and get access 14: Securing Systems From The Above AttaFile 3min
- log in to buy this course and get access 15: Sniffing Captive Portal Login Information In Monitor Mode (Preview) 10min
- log in to buy this course and get access 16: Sniffing Captive Portal Login Information Using ARP Spoofing 9min
- log in to buy this course and get access 17: Creating a Fake Captive Portal - Introduction 5min
- log in to buy this course and get access 18: Creating Login Page - Cloning a Login Page 8min
- log in to buy this course and get access 19: Creating Login Page - Fixing Relative Links 7min
- log in to buy this course and get access 20: Creating Login Page - Adding Form Tag 8min
- log in to buy this course and get access 21: Creating Login Page - Adding Submit Button 7min
- log in to buy this course and get access 22: Preparing Computer To Run Fake Captive Portal 8min
- log in to buy this course and get access 23: Starting The Fake Captive Portal 12min
- log in to buy this course and get access 24: Redirecting Requests To Captive Portal Login Page 12min
- log in to buy this course and get access 25: Generating Fake SSL Certificate 6min
- log in to buy this course and get access 26: Enabling SSL/HTTPS On Webserver 8min
- log in to buy this course and get access 27: Sniffing & Analysing Login Credentials 6min
- log in to buy this course and get access 28: Exploiting WPS - Introduction (Preview) 2min
- log in to buy this course and get access 29: Bypassing "Failed to associate" Issue 8min
- log in to buy this course and get access 30: Bypassing 0x3 and 0x4 Errors 8min
- log in to buy this course and get access 31: WPS Lock - What Is It & How To Bypass It 7min
- log in to buy this course and get access 32: Unlocking WPS 9min
- log in to buy this course and get access 33: Advanced Wordlist Attacks - Introduction (Preview) 2min
- log in to buy this course and get access 34: Saving Aircrack-ng Cracking Progress 10min
- log in to buy this course and get access 35: Using Huge Wordlists With Aircrack-ng Without Wasting Storage 8min
- log in to buy this course and get access 36: Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 10min
- log in to buy this course and get access 37: Cracking WPA/WPA2 Much Faster Using GPU - Part 1 7min
- log in to buy this course and get access 38: Cracking WPA/WPA2 Much Faster Using GPU - Part 2 11min
- log in to buy this course and get access 39: What is It & How it Works (Preview) 7min
- log in to buy this course and get access 40: Installing Needed Software 8min
- log in to buy this course and get access 41: Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 10min
- log in to buy this course and get access 42: Debugging & Fixing Login Interface 12min
- log in to buy this course and get access 43: What is WPA/WPA2 Enterprise & How it Works (Preview) 5min
- log in to buy this course and get access 44: How To Hack WPA/WPA2 Enterprise 7min
- log in to buy this course and get access 45: Stealing Login Credentials 8min
- log in to buy this course and get access 46: Cracking Login Credentials 7min
- log in to buy this course and get access 47: Securing Systems From The Above Gaining Access Attacks 5min
- log in to buy this course and get access 48: Post Connection Attacks Overview (Preview) 5min
- log in to buy this course and get access 49: Ettercap - Basic Overview 7min
- log in to buy this course and get access 50: Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 10
- log in to buy this course and get access 51: Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 13min
- log in to buy this course and get access 52: Automatically ARP Poisoning New Clients 7min
- log in to buy this course and get access 53: DNS Spoofing Using Ettercap 6min
- log in to buy this course and get access 54: Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 9min
- log in to buy this course and get access 55: MITM proxy - What is It & How To Install It 4min
- log in to buy this course and get access 56: Using MITMproxy In Explicit Mode 7min
- log in to buy this course and get access 57: Analysing (Filtering & Highlighting) Flows 5min
- log in to buy this course and get access 58: Intercepting Network Flows 5min
- log in to buy this course and get access 59: Modifying Responses & Injecting Javascript Manually 9min
- log in to buy this course and get access 60: Intercepting & Modifying Responses In Transparent Mode 8min
- log in to buy this course and get access 61: Editing Responses & Injecting BeEF's Code On The Fly 9min
- log in to buy this course and get access 62: Editing Responses Automatically Based On Regex 9min
- log in to buy this course and get access 63: Stealing Login Info Using Fake Login 7min
- log in to buy this course and get access 64: Hacking Windows 10 Using A Fake Updade Message 5min
- log in to buy this course and get access 65: What Do Mean By MITM Scripts? 6min
- log in to buy this course and get access 66: Capturing & Printing Requests/Responses 9min
- log in to buy this course and get access 67: Filtering Flows & Extracting Useful Data 9min
- log in to buy this course and get access 68: Using Conditions To Execute Code On Useful Flows 10min
- log in to buy this course and get access 69: Generating Custom HTTP Responses 9min
- log in to buy this course and get access 70: Testing Script Locally 8min
- log in to buy this course and get access 71: Generating Trojans - Installing The Trojan Factory 6min
- log in to buy this course and get access 72: Generating Trojans - Converting Any File (eg: mage) To a Trojan 10min
- log in to buy this course and get access 73: Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 7min
- log in to buy this course and get access 74: Executing Bash Commands & Calling Trojan Factory From Our Script 9min
- log in to buy this course and get access 75: Using Variables & More Complex Conditions 9min
- log in to buy this course and get access 76: Converting Downloads To Trojans On The Fly 10min
- log in to buy this course and get access 77: Configuring The Trojan Factory's MITMproxy Script 8min
- log in to buy this course and get access 78: Using The Trojan Factory MITMproxy Script 8min
- log in to buy this course and get access 79: Bypassing HTTPS With MITMproxy 6min
- log in to buy this course and get access 80: Replacing Downloads From HTTPS 5min
- log in to buy this course and get access 81: Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites 6min
- log in to buy this course and get access 82: Securing Systems From The Above Post Connection Attacks 6min



