Learn Network Hacking From Scratch (WiFi & Wired)
4.6 (2,417 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
34,031 students enrolled

Learn Network Hacking From Scratch (WiFi & Wired)

Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.
4.6 (2,417 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
34,031 students enrolled
Last updated 3/2019
English
English [Auto-generated], Indonesian [Auto-generated], 5 more
  • Italian [Auto-generated]
  • Polish [Auto-generated]
  • Romanian [Auto-generated]
  • Spanish [Auto-generated]
  • Thai [Auto-generated]
Current price: $11.99 Original price: $99.99 Discount: 88% off
1 day left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6.5 hours on-demand video
  • 2 articles
  • 10 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • 60+ detailed videos about practical networks attacks
  • Control connections of clients around you without knowing the password.

  • Crack WEP/WPA/WPA2 using a number of methods.

  • Hack any computer on the same network.
  • Intercept data and spy on all on the network
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • A number of practical attacks that can be used without knowing the key to the target network
  • ARP Spoofing/ARP Poisonning
  • Launch Various Man In The Middle attacks.
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Detect ARP poisoning and protect your self and your network against it.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
  • Combine individual attacks to launch even more powerful attacks.
Requirements
  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course).
Description

Welcome to my comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers, not only that but you'll also learn how to secure networks from hackers.

This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.


The Course is Divided into three main sections: 

  1. Pre-connection attacks: In this section you will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode  and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn  how to control connections around you (ie: deny/allow devices from connecting to networks) even without knowing the password of the target network.

  2. Gaining Access: Now that you gathered information about the networks around you, in this section you will learn a number of methods to crack the key and get the password to your target network weather it uses WEP, WPA or even WPA2.

  3. Post Connection attacks: Now that you have the key, you can connect to the target network, in this section you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and even gain full control over any client in your network! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients.


All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.).  in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.


NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED. 

Who this course is for:
  • Anybody who is interested in learning about network penetration testing
  • Anybody interested into learning how to protect networks from hackers.
Course content
Expand all 59 lectures 06:46:00
+ Introduction & Course Outline
1 lecture 03:35

Welcome to the course, this lecture will give you a full outline of the structure of the course, and will give you an over view of what will you learn in each section.

Preview 03:35
+ Preparation - Setting Up The Lab
5 lectures 40:08

In this course, we will be using a number of operating systems, Kali for hacking and a victim or target machine, in this section you will learn how to install these machines as virtual machines inside your current operating system, this allow use to use all of the machines at the same time, it also completely isolates these machines from your main machine therefore your main machine will not be affected if anything goes wrong.

This lecture will give you an overview of the lab that we will need to set up for this course.

Lab Overview & Needed Software
07:48

This lecture will give you an overview of what software you need to install for this course, and how it can be installed.

You will also see how to install Kali as a virtual machine.

Installing Kali 2019 As a Virtual Machine
10:13

In this lecture, you will learn how to store the current state of the virtual machines and how to use these restore points.

Creating & Using Snapshots
05:36

In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.

You will also learn how to connect your external wifi card to the virtual machine, this is extremely important for future videos.

Kali Linux Overview
05:10
The Linux Terminal & Basic Commands
11:21
+ Network Basics
4 lectures 24:54

In this lecture we shall talk about some basics that we need to understand before we can start learning how to test network's security.

Network Basics
04:28

This video will teach you how to connect a USB device to Kali, as an example I will be connecting a wireless adapter to it so I can interact with wireless networks and try to hack them form Kali.

Connecting a Wireless Adapter To Kali
05:09

In this lecture you shall learn what do mean by MAC address, what are they used for and how to change your MAC address.

MAC Address - What Is It & How To Change It
08:20

This lecture will clarify why is it possible to capture any packet around us even if it's not directed to our device, you will learn about two wireless modes: monitor and managed mode, you shall learn what is the difference between them, when do we use each of them and how to correctly enable monitor mode on your wireless card.

Wireless Modes (Managed & Monitor mode)
06:57
+ Pre-Connection Attacks
4 lectures 31:54

This is the first lecture in the "pre connection section", in this lecture you will learn how to use airodump-ng to see all the access points and associated clients that are within your wireless range and gather information about them.

Packet Sniffing Basics Using Airodump-ng
06:40

In this lecture you will learn what are the 2 bands used on WiFi networks and how to use airodump-ng to capture data sent over these bands

WiFi Bands - 2.4Ghz & 5Ghz Frequencies
07:54

In this lecture , we shall learn how to launch airodump-ng on a specific AP , and store all packets in a capture file.

Targeted Packet Sniffing Using Airodump-ng
10:30

Deauthentication attacks allow us to disconnect (disassociate) any connected client to any network that is within our wifi range even if the network uses encryption (such as WEP/WPA/WPA2).

Deauthentication Attack (Disconnecting Any Device From The Network)
06:50
+ Gaining Access
1 lecture 01:09

Welcome to this section of the course , in this section we shall learn how to break WEP/WPA/WPA2 encryption and determine the network key.

Preview 01:09
+ Gaining Access - WEP Cracking
6 lectures 40:24

This lecture explains the weaknesses in WEP encryption and how we can use these weaknesses to break it.

Theory Behind Cracking WEP Encryption
05:47

In this video we shall learn the basics of cracking WEP encryption , the target is a WEP encrypted network with active clients.

Basic Case
06:17

In this lecture we shall learn the theory behind cracking WEP encrypted APs with no or idle clients.

To do this we shall learn three methods of packet injection, but before we can inject packets into the traffic we need to authenticate our wifi card with the target AP so that it does not ignore our requests as AP's only accept packets from associated devices, therefore we shall learn how to fake authenticate our wifi card with the target AP so that it starts accepting packets from us.

Associating With Target Network Using Fake Authentication Attack
06:45

This is the first method of cracking idle or client less AP's that we shall learn .

In this method , after successfully associating with the target AP , we will wait for an ARP packet , we will then capture this packet and inject it into the traffic , this will force the AP to generate a new ARP packet with a new IV , we capture this new packet and inject into the traffic again , this process is repeated until the number of IV's captured is sufficient enough to crack the key.

Packet Injection - ARP Request Reply Attack
06:09

This is the 2nd method of cracking idle or client less AP's.

In this method we will capture an ARP packet and attempt to guess its key stream and use it to forge a new packet (using packetforge-ng) ,then we can inject this new forged packet into the traffic to generate new IV's.

Packet Injection - Korek Chopchop Attack
07:42

This is the 3rd method of cracking idle or client less AP's.

The goal of this method is to obtain 1500 bytes of the PRGA (pseudo random generation algorithm) , this can be used to forge a new packet which can be injected into the traffic to generate new IV's.

Preview 07:44
+ Gaining Access - WPA/WPA2 Cracking
7 lectures 48:08

This is an introduction to WPA/WPA2 , we shall learn what is the main difference between WPA and WEP and why WPA is more difficult to crack.

Introduction to WPA / WPA2 Cracking
03:42

In this lecture we shall learn how to exploit the WPS feature to crack WPA/WPA2 encrypted AP's without a wordlist attack and without the need to any connected clients.

Exploiting the WPS Feature
10:11

In this lecture we shall learn how to capture the handshake from the target AP.

How to Capture a Handshake
06:49

To crack WPA/WPA2 we need to use a wordlist attacks , you can download ready wordlists from the internet or create your own by following this lecture.

Creating a Wordlist / Dictionary
07:33

In this lecture we will use the wordlist created in the previous lecture to crack the WPA key using aircrack-ng.

Cracking the Key Using a Wordlist Attack
06:26

Computing the PMK is slow, and we only need the wordlist and the essid of the target AP to compute it, therefore we can save time and compute the PMK for our wordlist while waiting for the handshake. This lecture shows how to create a database of ready PMK's for the target AP , so that the cracking process would be much quicker once we capture the handshake.

Preview 07:00

GPU's are faster than CPU's , there for if you have a powerful GPU you can use hashcat to crack the WPA/WPA2 key using the GPU, this would be much quicker than using aircrack-ng which uses the CPU.

Quicker Wordlist Attack using the GPU
06:27
+ Gaining Access - Security & Mitigation
2 lectures 08:28
Securing Your Network From The Above Attacks
02:03

In this video you will learn how to access the settings page for your router and change the settings to increase the security of your wireless network.

How to Configure Wireless Security Settings To Secure Your Network
06:25
+ Post Connection Attacks
2 lectures 04:47

This lecture is an introduction to the last section of this course, it will give you an outline of what we shall learn in this section and some important notes.

Preview 02:10

In this lecture you will learn how to set up a windows virtual machine so that we can try and hack into it to practice penetration testing.

Installing Windows As a Virtual machine
02:37
+ Post Connection Attacks - Information Gathering
3 lectures 23:32

Gathering information is one of the most important steps in penetration testing. In this lecture we will learn how to use netdiscover to discover connected devices to our network.

Discovering Connected Clients using netdiscover
08:39

In this lecture we shall learn how to use zenmap (the GUI for nmap) to discover all connected devices and gather detailed information about these devices, such as their operating system, open ports and even services using these ports.

Gathering More Information Using Zenmap
06:45

In this lecture we shall learn how to use zenmap (the GUI for nmap) to discover all connected devices and gather detailed information about these devices.

Gathering Even More Information Using Zenmap
08:08