Learn Network Hacking From Scratch (WiFi & Wired) (Updated 2021)
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size4.1 GB
- Uploaded BySource1337
- Downloads733
- Last checkedMay. 16th '21
- Date uploadedMay. 13th '21
- Seeders 25
- Leechers15
Quote:
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️
Code:
What you'll learn
60+ detailed videos about practical networks attacks
Control connections of clients around you without knowing the password.
Crack WEP/WPA/WPA2 using a number of methods.
Hack any computer on the same network.
Intercept data and spy on all on the network
Gather detailed information about clients and networks like their OS, opened ports ...etc.
A number of practical attacks that can be used without knowing the key to the target network
ARP Spoofing/ARP Poisonning
Launch Various Man In The Middle attacks.
Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
Detect ARP poisoning and protect your self and your network against it.
You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Combine individual attacks to launch even more powerful attacks.
60+ detailed videos about practical networks attacks
Control connections of clients around you without knowing the password.
Crack WEP/WPA/WPA2 using a number of methods.
Hack any computer on the same network.
Intercept data and spy on all on the network
Gather detailed information about clients and networks like their OS, opened ports ...etc.
A number of practical attacks that can be used without knowing the key to the target network
ARP Spoofing/ARP Poisonning
Launch Various Man In The Middle attacks.
Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
Detect ARP poisoning and protect your self and your network against it.
You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
Combine individual attacks to launch even more powerful attacks.
Code:
Requirements
Basic IT skills
No Linux, programming or hacking knowledge required.
Computer with a minimum of 4GB ram/memory
Operating System: Windows / OS X / Linux
For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
Basic IT skills
No Linux, programming or hacking knowledge required.
Computer with a minimum of 4GB ram/memory
Operating System: Windows / OS X / Linux
For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
Files:
Learn Network Hacking From Scratch WiFi & Wired Learn Network Hacking From Scratch WiFi & Wired 2. Preparation - Setting Up The Lab- 5. The Linux Terminal & Basic Commands.mp4 (223.4 MB)
- 1. Lab Overview & Needed Software.mp4 (106.4 MB)
- 1. Lab Overview & Needed Software.vtt (44.3 MB)
- 1.1 Virtual Box Download Page.html (0.1 KB)
- 1.2 The lab.pdf.pdf (195.6 KB)
- 2. Installing Kali 2019 As a Virtual Machine.mp4 (156.0 MB)
- 2. Installing Kali 2019 As a Virtual Machine.vtt (11.5 KB)
- 2.1 Kali Virtual Image Download Link.html (0.1 KB)
- 2.2 How To Fix No Nat Network Issue.html (0.1 KB)
- 2.3 Installing Kali Using ISO (use this method to install it as a MAIN machine)..html (0.1 KB)
- 2.4 The-Lab.pdf.pdf (334.4 KB)
- 2.5 How To Fix Blank Screen When Starting Kali.html (0.2 KB)
- 3. Creating & Using Snapshots.mp4 (89.4 MB)
- 3. Creating & Using Snapshots.vtt (7.0 KB)
- 4. Kali Linux Overview.mp4 (107.4 MB)
- 4. Kali Linux Overview.vtt (5.8 KB)
- 5. The Linux Terminal & Basic Commands.vtt (12.3 KB)
- 5.1 Linux Commands List.html (0.1 KB)
- 6 Simple Memory Techniques.html (0.1 KB)
- 1. Introduction & Course Outline.vtt (4.9 KB)
- 1. Introduction & Course Outline.mp4 (37.3 MB)
- 1. Network Basics.mp4 (67.4 MB)
- 1. Network Basics.vtt (4.4 KB)
- 1.1 Networks Intro.pdf.pdf (106.8 KB)
- 2. Connecting a Wireless Adapter To Kali.mp4 (71.0 MB)
- 2. Connecting a Wireless Adapter To Kali.vtt (5.9 KB)
- 2.2 Virtual Box Extension Pack Download Page.html (0.1 KB)
- 2.3 Website That Sells Supported Wireless Adapters.html (0.1 KB)
- 3. MAC Address - What Is It & How To Change It.mp4 (97.2 MB)
- 3. MAC Address - What Is It & How To Change It.vtt (8.3 KB)
- 4. Wireless Modes (Managed & Monitor mode).mp4 (50.3 MB)
- 4. Wireless Modes (Managed & Monitor mode).vtt (7.1 KB)
- 4.2 Another Method to Enable Monitor Mode.html (0.1 KB)
- Alfa AC1900 WiFi Adapter.html (0.1 KB)
- Alfa AWUS036NHA 150Mbps Wireless USB Adaptor.html (0.1 KB)
- Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter.html (0.1 KB)
- Panda Wireless PAU06 300Mbps N USB Adapter.html (0.1 KB)
- 1. Packet Sniffing Basics Using Airodump-ng.mp4 (41.3 MB)
- 1. Packet Sniffing Basics Using Airodump-ng.vtt (6.8 KB)
- 1.1 Pre Connection Attacks.pdf (156.7 KB)
- 2. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.mp4 (49.5 MB)
- 2. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.vtt (8.7 KB)
- 3. Targeted Packet Sniffing Using Airodump-ng.mp4 (55.4 MB)
- 3. Targeted Packet Sniffing Using Airodump-ng.vtt (11.2 KB)
- 4. Deauthentication Attack (Disconnecting Any Device From The Network).mp4 (62.6 MB)
- 4. Deauthentication Attack (Disconnecting Any Device From The Network).vtt (7.4 KB)
- 1. Gaining Access Introduction.mp4 (25.2 MB)
- 1. Gaining Access Introduction.vtt (1.3 KB)
- 1.1 Network Hacking - Gaining Access.pdf.pdf (782.1 KB)
- 1. Theory Behind Cracking WEP Encryption.mp4 (86.8 MB)
- 1. Theory Behind Cracking WEP Encryption.vtt (6.1 KB)
- 2. Basic Case.mp4 (46.8 MB)
- 2. Basic Case.vtt (6.8 KB)
- 3. Associating With Target Network Using Fake Authentication Attack.mp4 (55.1 MB)
- 3. Associating With Target Network Using Fake Authentication Attack.vtt (7.2 KB)
- 4. Packet Injection - ARP Request Reply Attack.mp4 (60.4 MB)
- 4. Packet Injection - ARP Request Reply Attack.vtt (6.5 KB)
- 5. Packet Injection - Korek Chopchop Attack.mp4 (17.4 MB)
- 5. Packet Injection - Korek Chopchop Attack.vtt (7.4 KB)
- 6. Packet Injection - Fragmentation Attack.mp4 (8.4 MB)
- 6. Packet Injection - Fragmentation Attack.vtt (8.1 KB)
- 1. Introduction to WPA WPA2 Cracking.mp4 (54.1 MB)
- 1. Introduction to WPA WPA2 Cracking.vtt (3.8 KB)
- 2. Exploiting the WPS Feature.mp4 (60.8 MB)
- 2. Exploiting the WPS Feature.vtt (11.6 KB)
- 2.1 Reaver Download Link.html (0.1 KB)
- 3. How to Capture a Handshake.mp4 (46.3 MB)
- 3. How to Capture a Handshake.vtt (7.5 KB)
- 4. Creating a Wordlist Dictionary.mp4 (75.8 MB)
- 4. Creating a Wordlist Dictionary.vtt (8.4 KB)
- 4.1 Some-Links-To-Wordlists (1).txt.txt (0.4 KB)
- 5. Cracking the Key Using a Wordlist Attack.mp4 (58.9 MB)
- 5. Cracking the Key Using a Wordlist Attack.vtt (7.1 KB)
- 6. Cracking the Key Quicker using a Rainbow Table.mp4 (5.9 MB)
- 6. Cracking the Key Quicker using a Rainbow Table.vtt (9.1 KB)
- 7. Quicker Wordlist Attack using the GPU.mp4 (7.8 MB)
- 7. Quicker Wordlist Attack using the GPU.vtt (7.9 KB)
- 7.1 oclHashcat - advanced password recovery.html (0.1 KB)
- 7.2 HashCat GUI Download Link.html (0.1 KB)
- 7.3 cap Converter.html (0.1 KB)
- 1. Securing Your Network From The Above Attacks.html (2.7 KB)
- 2. How to Configure Wireless Security Settings To Secure Your Network.mp4 (28.6 MB)
- 2. How to Configure Wireless Security Settings To Secure Your Network.vtt (7.7 KB)
- 1. Post Connection Attacks Introduction.mp4 (46.3 MB)
- 1. Post Connection Attacks Introduction.vtt (2.5 KB)
- 1.1 Post Connection Attacks.pdf.pdf (1.3 MB)
- 1.2 Network-Pentesting-Post-Connection-Attacks.pdf.pdf (1.5 MB)
- 2. Installing Windows As a Virtual machine.mp4 (7.3 MB)
- 2. Installing Windows As a Virtual machine.vtt (3.0 KB)
- 2.1 Windows Download Page.html (0.1 KB)
- Seagate Portable.html (0.1 KB)
- 1. Discovering Connected Clients using netdiscov
Code:
- udp://tracker.opentrackr.org:1337/announce
- udp://tracker.openbittorrent.com:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://www.torrent.eu.org:451/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://retracker.lanta-net.ru:2710/announce
- udp://open.stealth.si:80/announce
- udp://wassermann.online:6969/announce
- udp://vibe.community:6969/announce
- udp://valakas.rollo.dnsabr.com:2710/announce