Learn Man In The Middle Attacks From Scratch
4.7 (9 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
152 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learn Man In The Middle Attacks From Scratch to your Wishlist.

Add to Wishlist

Learn Man In The Middle Attacks From Scratch

The comprehensive course to perform MITM attacks against the connected clients & protect them from all of these attacks.
4.7 (9 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
152 students enrolled
Created by Saad Sarraj
Last updated 8/2017
English
Current price: $10 Original price: $50 Discount: 80% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • 2 Articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Setup your Kali Linux environment properly
  • You will learn the basics of network
  • Learn some Linux commands
  • You will be able to deal with a lot of Kali Linux tools
  • Learn ARP Poisoning
  • Launch ARP Poisoning attack
  • Launch (Man in the middle attack)
  • Gain access to any client account in the WiFi network
  • Detect ARP Poisoning (MITM) attack to protect yourself against it
View Curriculum
Requirements
  • PC or Laptop
  • Kali Linux Distribution
  • Basic IT skills
Description

Notice:

This Price is for the 1st 100 students, so it will go up after that.

in this course, you will start as a beginner without any previous knowledge about the hacking, this course focuses on the practical side more than the theoretical side.

 In this course you will learn how to set up your Kali Linux Environment properly and it's going to be Kali Linux 2.0
which is the newest version of offensive security Organization, then you will learn how the Devices communicate with each other then you will go through the theory behind man in the middle attacks because this will help you to understand what's going on, then we will learn the theory behind ARP poisoning and how to perform it.

This course is divided to four parts:

  1. Preparation: In this section, you will learn how to download and setup Kali Linux 2.0 properly as a virtual machine, and how you can update it, this will help you to create your safe Environment to do Penetration Testing .
  2. Network Basics: here you will learn the basics of networks that will help you to understand what you should do before network security testing.
  3. MITM Attack: this section which is the gravest and the funniest section in this course because its includes a lot of funny things that you can do such as (playing music in the target computer, stealing the passwords, etc....) and even fully control the connected device.
  4. Protecting yourself against these attacks: after learning these attacks now it's time to learn how to protect yourself and your accounts against all previous attacks.

Notes: 

  • tThese Attacks are working on any device such as (Tablets Laptops and Smartphones etc....)  and on any operating system, such as (IOS, Android, Windows, Linux, OSX, etc....).
  •  You must practice what you learned to become an advanced level, because this course is focuses on practical side. 
  • This course is going to be always up to date.
  • This course is only for ethical purposes.
  • If you have any question or any problem, you can send a message to us or comment.
  • After finishing this course, you will get a certificate from Udemy.
  • All the people who enrolled in this course will get discounts for future courses.
  • All the Rights are Reserved to iSecurityPro no other Organization is involved.
Who is the target audience?
  • This course is for the people who want to do a Penetration Testing against their devices
  • for the people who wants secure their devices against these attacks
  • For the people who wants to protect themselfs and there accounts against all of these attacks.
Compare to Other Ethical Hacking Courses
Curriculum For This Course
35 Lectures
02:48:11
+
Introduction
1 Lecture 01:01
+
Prepration
5 Lectures 22:48

this video will show you how to install Kali Linux 2.0 as your main operating system properly without any issues.

Preview 09:04



You'll be able to setup your windows environment properly without any issues, because in the future videos we are going to use it in many scenarios as the victim computer.

Setup Windows as a Virtual Machine
02:52

this video will show you how you can update your Kali Linux 2.0 sources list and upgrade all the tools that is in Kali Linux using only one command.

Updating Kali LInux 2.0
03:23
+
The Basics of Networks
2 Lectures 07:59

in this video you will learn the basics of networks that will help you to understand whats happening in the real world before you enter cracking WiFi encryption section.

Preview 02:36

in this video you will learn the mac address and how its works , and how you can spoof your mac address to bypass some hotels paid WiFi hotspot systems.

What is the Mac address ? and how you can change it ?
05:23
+
Performing Man in the Middle Attacks
16 Lectures 01:26:08

this video is only an introduction about MITM attack.

introduction
01:12

Before we get started into MITM attack we shall learn what is MITM attack, and the theory behind this attack.

Man in the middle attack explain
03:40

In this video you'll be able to discover the connected clients and their IP & mac addresses, this is by using Netdiscover tool.

Gathering information about the connected clients
02:59

in this video you'll be able to gather a detailed information about the connected clients, because this will help you to specify your target.

Gather detailed information about the clients
07:10

In this video you'll be able to poison the ARP table, in the target device and this is by telling the router that i am the client and telling the client that i am the router
Preview 06:36

In this video you'll be able to capture any login information from any client such as the Email and the Password, this is by using MITMF.

Capturing login credentials
05:23

In this video you'll be able to bypass SSL certificate issue,

because some websites such as Gmail Yahoo Microsoft are uses SSL
certificate, that's mean you cannot capture the login information
because it's encrypted, but in this video you'll learn how to downgrade the connection from HTTPS to HTTP in order to bypass this issue.

Bypassing SSL Certificate
06:38

in this video you'll learn how to redirect any client from any website to another, so you can redirect the target to a page could have a malicious backdoor into it, or you can redirect the client from the trusted website to a fake page has the exact same interface, so you'll bypass SSL issue and HSTS.

Redirect any client from to any website
06:32

in this video you'll be able to bypass remember me issue,

because if the target uses remember me option that's mean he will be
redirected to the meant website without having to enter the key, so in
this video you'll learn how to steal the cookies from the target browser and inject it into your browser, then you'll be redirected to the target account without entering the email & password.

Stealing the Cookies
07:02

in this video you'll be able to capture a screenshot from the target browser so you will see what he is watching, chatting, browsing and more....
Preview 04:12

In this video you'll be able to inject a keylogger into the target browser, so you will be able to see what the target is typing, or his conversations.

Injecting a keylogger into the target webpage
04:49

in this video you'll be able to capture all the images from the target browser and this is by using Driftnet tool.

Capturing images from the network traffic
03:35

In this video you'll be able to inject any HTML code or file into the target browser, and you'll be able to flip all the images 180 degrees in the target browser.

Injecting html file and flip the images in the target browser
06:48

In this video you'll be able to inject any JavaScript file or code into the target browser, and how to Hook the clients with BeEF project.

Injecting JavaScript URL and Hooking the client’s with BeEF
06:58

in this video you'll be able to steal the target social network accounts such as (Facebook,Google,Yahoo,etc…..) and this is by showing the target a fake login prompt asks him to renew his session.

Stealing the Target accounts with BeEF
03:45

this video is only for entertainment, because you'll be able to run some funny commands in the target browser.

Having Fun with BeEF
08:49
+
Hacking the connected clients
5 Lectures 26:45

in this  video you'll be able to create undetectable backdoor by using Veil-evasion tool, because if the target computer uses an Antivirus it will detect your backdoor and prevent it from executing.

Creating an encrypted Backdoor
04:47

in this video you will be able to run your encrypted backdoor into the target computer,but before we do that we shall learn how to listen for incoming connection.

Testing the Backdoor in the target device
04:29

In this video you will be able to force your target to run your backdoor, this done by showing the target a fake update, once he install it and run it he will be Hacked.

Creating a fake browser update & and Hack any client
04:49

In this video you'll learn how to interact with the target computer through Meterpreter command line, in this part i focused on the most useful commands to interact with the target machine.

Interacting with the Target Computer (Part 1)
06:29

In the second part you'll learn the most enjoyable commands that you can use in the target computer.

Interacting with the Target Computer (Part 2)
06:11
+
Detection and Security
4 Lectures 21:00

in this video you will be able to detect any MITM attack and this is by using XARP program that's tells you if somebody trying to poison your ARP table.

Detect ARP Poisoning attack using (XARP)
03:21

after watching you will be able to detect any ARP poisoning attack and detect if anybody trying to scan your network, this done by analyzing the network traffic.
Detect ARP Poisoning attack (Wireshark)
05:34

after learning how to detect any ARP poisoning attack, in this video you'll be able to prevent your ARP table from modifying, this done by changing the mac address table from dynamic to static.
Prevent your ARP table from poisoning
05:51

you'll be able to detect any Meterpreter session on your windows memory and kill it, this done by scanning the running services and processes on your windows memory, and also you’ll be able to detect the encrypted backdoor.
Detect and Kill any Meterpreter Session
06:14
+
Conclusion
1 Lecture 00:53
Conclusion
00:53
+
Bonus Section
1 Lecture 02:27
Bonus Lecture - Discounts On My Ethical Hacking Courses
02:27
About the Instructor
Saad Sarraj
4.7 Average rating
90 Reviews
836 Students
3 Courses
Ethical Hacker, IT Expert

My Name is Saad Sarraj , i am a young Ethical Hacker who is trying to keep the things secure.I have a very good Experience in penetration testing and Ethical Hacking, i started in this field since 2012 , then i have created my own website (iSecurityPro) and started making videos on my YouTube channel which includes many tips and tricks about Linux OS and Windows OS , i am always focusing on the practical side in producing videos and also the theory behind every single attack , and  i am trying to share my experience with you from what i learned before .