ARP spoofing &Man In The Middle Attacks Execution &Detection
4.8 (345 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,137 students enrolled

ARP spoofing &Man In The Middle Attacks Execution &Detection

Learn practical attacks to test the security of clients connected to a network and how to protect against these attacks
Bestseller
4.8 (345 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,138 students enrolled
Last updated 5/2020
English
English [Auto]
Current price: $34.99 Original price: $49.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4.5 hours on-demand video
  • 1 article
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • 21 detailed videos about practical attacks against Wi-Fi networks
  • Learn network basics and how devices interact with each other
  • Map the current network and gather info about connected clients
  • Learn the theory behind ARP poisoning and MITM attacks
  • Change the flow of packets in a network
  • Launch Various Man In The Middle attacks.
  • Gain access to any account accessed by any client in your network.
  • Capture all passwords entered by clients on the same netowrk
  • Bypass HTTPS/SSL
  • Redirect DNS requests (DNS Spoofing)
  • Capture and inject Cookies (to gain access to accounts without a password)
  • Create Fake Login Pages and redirect real pages to the fake one
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Detect ARP poisoning and protect your self and your network against it.
  • Combine individual attacks to launch even more powerful attacks.
Requirements
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • Network card (ethernet or Wifi)
Description

In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks.

This course is focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack, all the attacks explained in this course are launched against real devices in my lap.

The Course is Divided into four main sections:

  1. Networks Basics: in this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? What is MAC address and how to change it ?

  2. Information Gathering: In this section you will learn how to map the current network, ie: discover all the connected devices (clients), not only that but you will also learn how to gather important information about these clients, such as their MAC address, their IP, Operating system, open ports, programs that are using these ports and maybe even the exact version of the program.

  3. MITM Attacks: in this section you will learn a number of very powerful attacks that you can launch against the network and the connected clients, these attacks will allow you to gain access to any account accessed by any client connected to your network, read all the traffic used by these clients (images , videos , audio passwords, cookies, urls ...etc), and gain full access to any client in your network.

  4. Protection: In this section you will learn how to detect these attacks and protect yourself and your network against them.

All the attacks in this course are practical attacks that work against any device connected to our network, ie: it does not matter if the device is a phone , tablet laptop ...etc. Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED. 

Who this course is for:
  • Anybody who is interested in learning about network penetration testing
  • Anybody interested into learning how to protect networks from hackers.
Course content
Expand all 35 lectures 04:21:24
+ Introduction & Course Outline
1 lecture 04:55

Welcome to the course, this lecture will give you a full outline of the structure of the course, and will give you an over view of what will you learn in each section.

Preview 04:55
+ Preparation
4 lectures 35:32

In this course, we will be using a number of operating systems, Kali for hacking and a victim or target machine, in this section you will learn how to install these machines as virtual machines inside your current operating system, this allow use to use all of the machines at the same time, it also completely isolates these machines from your main machine therefore your main machine will not be affected if anything goes wrong.

This lecture will give you an overview of the lab that we will need to set up for this course.

Lab Overview & Needed Software
07:48
Installing Kali 2020 As a Virtual Machine
11:13

In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.

You will also learn how to connect your external wifi card to the virtual machine, this is extremely important for future videos.

Kali Linux Overview
05:10
Linux Terminal & Basic Commands
11:21
+ Network Basics
3 lectures 17:40

In this lecture we shall talk about some basics that we need to understand before we can start learning how to test network's security.

Network Basics
04:28

This video will teach you how to connect a USB device to Kali, as an example I will be connecting a wireless adapter to it so I can interact with wireless networks and try to hack them form Kali.

Connecting a Wireless Adapter To Kali
05:09

In this lecture you shall learn what do we mean by MAC address, what are they used for and how to change your MAC address.

What is MAC Address & How To Change It
08:03
+ Information Gathering
4 lectures 27:04
Installing Windows As a Virtual Machine
03:32

Gathering information is one of the most important steps in penetration testing. In this lecture we will learn how to use netdiscover to discover connected devices to our network.

Discovering Connected Clients using netdiscover
08:39

In this lecture we shall learn how to use zenmap (the GUI for nmap) to discover all connected devices and gather detailed information about these devices, such as their operating system, open ports and even services using these ports.

Gathering More Information Using Zenmap
06:45

In this lecture we shall learn how to use zenmap (the GUI for nmap) to discover all connected devices and gather detailed information about these devices.

Gathering Even More Information Using Zenmap
08:08
+ Man In The Middle (MITM) Attacks
11 lectures 01:32:34

In this video we shall learn about one of the most dangerous and effective attacks that you can launch on a network; (Man In The Middle Attacks) , we shall learn the theory behind ARP poisoning and why it is it so dangerous and effective.

Preview 09:04

In this lecture we will learn how to use arpspoof to do a basic ARP poisoning attack and redirect the flow of packets in the network. 

ARP Poisonning Using arpspoof
06:30

This video shows you how to properly install bettercap on Kali Linux, and gives you a basic overview on how to start it and interact with it.

Bettercap Basics
08:38

In this lecture you will learn how to configure and use modules in bettercap.

As an example you'll learn how to ARP poison a target client using the arp spoof module.

ARP Poisonning Using Bettercap
08:17

In this lecture you'll learn how to configure and use the sniff module in bettercap to spy on devices on the same network, so you'll learn how to see all urls they load, images, usernames, passwords and more!

Spying on Network Devices (Capturing Passwords, Visited Websites...etc)
05:11

In this lecture you'll learn how to create your own MITM scripts, also known as bettercap caplets, in this example you'll learn how to create a caplet to automatically spoof clients on your network to place you in the middle of the connection and start a sniffer to spy on these clients and see all the data they send/receive including usernames and passwords.

Creating Custom Spoofing Script
09:42

This lecture will teach you what HTTPS is and how to properly configure Bettercap to bypass HTTPS so you can see data sent to and from more secure websites that use HTTPS by default.

Understanding HTTPS & How to Bypass it
06:06

In this lecture we shall learn how to bypass HTTPS/SSL so that we can sniff passwords from HTTPS enabled web pages such as facebook and yahoo.

Bypassing HTTPS
07:26

Really big websites such as Facebook and Twitter use Strict Transport Security (HSTS),  modern browsers come with a list of websites that they can only browse as HTTPS, so when we use the method shown in previous lectures the browser will either refuse to load HSTS websites OR load them over HTTPS.

In this lecture you'll learn how to use a custom version of the hstshijack caplet to partially bypass HSTS, this will allow you to capture data sent to and from websites that use HSTS such as Facebook.

Bypassing HSTS
10:23

In this lecture we shall learn how to control DNS requests made targets, this allows us to redirect requests to any other place, this can be very useful as it can be used to redirect computers to fake websites, fake updates, fake logins ...etc. 

Preview 10:51

In this lecture you will learn how to inject Javascript code into the target browser, this is vey dangerous as it allows us to run a large number of attacks using javascript codes (more on this later), in this lecture we'll focus on injecting a simple javascript code.

Injecting Javascript Code
10:26
+ Packet Sniffing With Wireshark
4 lectures 28:10

Wireshark is a network protocol analyser, in this lecture we will have a basic overview on it, you will learn why is it useful and how to use it with MITM attacks or use it to analyse a capture file that contains data that you already sniffed.

Basic Overview & How To Use It With MITM Attacks
08:24

I this lecture you will learn how to use Wireshark to sniff & analyse data (traffic) sent/received by any client in your network.

Sniffing & Analysing Data
05:30

In this lecture we will continue using Wireshark, you will learn how to analyse the captured data, trace packets and read details of each.

Using Filters, Tracing & Dissecting Packets
06:28

In this lecture you'll learn how to filter sniffed data and extract useful information such as usernames and passwords.

Capturing Passwords & Anything Sent By Any Device In The Network
07:48
+ Backdooring Updates to Gain Access to Any Connected Client
5 lectures 42:22

In this lecture you will learn how to download and install Veil Framework.

Installing Veil 3.1
06:20

In this lecture you will learn how to create a backdoor that is not detectable by antivirus programs, this is very important in client side attacks as we will be using this backdoor in future videos to try and gain control over the target system.

Creating An Undetectable Backdoor
09:44

In this lecture you will learn how to listen for connections coming from the backdoor we generated in the previous lecture.

Listening For Incoming Connections
07:18

Finally we will test the backdoor that we generated on a Windows machine and make sure that it works as expected.

Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
07:12

This lecture will teach you how to gain full access over a target computer by serving it a fake update for an existing program, once the target user installs the update you will gain full access to their computer.

Note: you need to be the man in the middle for this method to work.

-------------

Note: The latest version of evilgrade does not work properly, so don't download evilgrade using the git clone command in the installation commands, instead download it from the following link:

https://www.dropbox.com/s/vr1mpesah1ybuai/evilgrade.zip?dl=1

Creating a Fake Update & Hacking Any Device In The Network
11:48
+ Detection
2 lectures 10:46

In this lecture we shall learn two methods to detect ARP poisoning attacks.

Detecting ARP Poisoning Attacks
05:05

In this lecture we shall learn how to use Wireshark to detect ARP Poisoning attacks and other suspicious activities in the network, we will also learn how to protect against ARP Poisoning attacks.

Detecting Suspicious Activities using Wireshark
05:41
+ Bonus Section
1 lecture 02:20
Bonus Lecture - Discounts On My Full Ethical Hacking Courses
02:20