Learn Network Hacking From Scratch (WiFi & Wired)

Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.
4.6 (782 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
17,817 students enrolled
85% off
Take This Course
  • Lectures 58
  • Length 5.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 9/2014 English

Course Description

This course was last updated on 29/12/2016

Welcome to my comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab. 

The course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.. This course will take you from a beginner to a more advanced level.

The Course is Divided into three main sections:

  1. Pre-connection: in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card and you will learn a number of attacks that you can launch without the need to know the password such as controlling all the connections around you (ie: deny/allow any device from connecting to any network), you will also learn how to create a fake access point to attract users to connect to it and capture any important information they enter such as usernames and passwords.
  2. Gaining Access: Now that you have gathered information about all the networks around you, and found your target, you will learn how to crack the key that the target uses. In this section you will learn a number of methods to crack WEP/WPA/WPA2 encryption.
  3. Post Connection: Now you have the key to your target network and you can connect to it. in this section you will learn a number of very powerful attacks that you can launch against the network and the connected clients, these attacks will allow you to gain access to any account accessed by any client connected to your network, read all the traffic used by these clients (images , videos , audio passwords ...etc), and gain full control over any client in your network . After that you will learn how to detect these attacks and protect yourself and your network against them.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

Note: All the videos in this course are downloadable.

NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

What are the requirements?

  • Basic IT skills
  • Wireless adapter (for the wifi cracking section ONLY) - ALFA AWUS036NHA and TP-LINK TL-WN722n are the recommended ones.
  • Kali Linux (can be download for free from http://www.kali.org/downloads/)

What am I going to get from this course?

  • 50 detailed videos about practical attacks against Wi-Fi networks
  • A number of practical attacks that can be used without knowing the key to the target network
  • Control connections of clients around you without knowing the password.
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • Crack WEP/WPA/WPA2 encryptions using a number of methods.
  • ARP Spoofing/ARP Poisonning
  • Launch Various Man In The Middle attacks.
  • Gain access to any account accessed by any client in your network.
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Detect ARP poisoning and protect your self and your network against it.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
  • Combine individual attacks to launch even more powerful attacks.

Who is the target audience?

  • Anybody who is interested in learning about network penetration testing
  • Anybody interested into learning how to protect networks from hackers.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.



Welcome to the course, this lecture will give you a full outline of the structure of the course, and will give you an over view of what will you learn in each section.

Section 1: Preparation - Setting Up The Lab

This lecture will give you an overview of what software you need to install for this course, and how it can be installed.

You will also see how to install Kali as a virtual machine.


In this lecture you will learn how to install Kali Linux using the iso image.

Skip this lecture if the method above works for you and you're happy enough with it.


In this lecture you will learn how to set up a windows virtual machine so that we can try and hack into it to practice penetration testing.


In this lecture, you will learn how to store the current state of the virtual machines and how to use these restore points.


In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.

You will also learn how to connect your external wifi card to the virtual machine, this is extremely important for future videos.


In this lecture you will learn how to install programs on Kali, update the sources and upgrade the system.

Checkout the links in the resources if you face any issues after upgrading.

Section 2: Network Basics

In this lecture we shall talk about some basics that we need to understand before we can start learning how to test network's security.


In this lecture you shall learn what do mean by MAC address, what are they used for and how to change your MAC address.


This lecture will clarify why is it possible to capture any packet around us even if it's not directed to our device, you will learn about two wireless modes: monitor and managed mode, you shall learn what is the difference between them, when do we use each of them and how to correctly enable monitor mode on your wireless card.

Since the last update of Aircrack-ng which comes pre installed with Kali 2, arimon-ng stopped working for some wifi cards, therefore if it does not work for you, I recommend using this method to enable monitor mode.

This video shows another method that can be used to enable monitor mode just incase the method explained in the previous lectures did not enable it properly for you.

Section 3: Pre-Connection Attacks

This is the first lecture in the "pre connection section", in this lecture you will learn how to use airodump-ng to see all the access points and associated clients that are within your wireless range and gather information about them.


In this lecture , we shall learn how to launch airodump-ng on a specific AP , and store all packets in a capture file.


Deauthentication attacks allow us to disconnect (disassociate) any connected client to any network that is within our wifi range even if the network uses encryption (such as WEP/WPA/WPA2).


Fake access points can be handy in many scenarios , one example is creating an open AP , this will attract a lot of clients , many of which will automatically connect to it. Then we can sniff all the traffic created by the clients that connect to it , and since its open , the traffic will not be encrypted !

This lecture will explain the theory behind creating a fake AP and what do we need to make it work.


In this lecture we shall see how we can create a fake AP using Kali linux.


In this lecture you will learn an easier way to create a fake AP using a tool called Mana-Toolkit.

Section 4: Gaining Access

Welcome to this section of the course , in this section we shall learn how to break WEP/WPA/WPA2 encryption and determine the network key.

Section 5: Gaining Access - WEP Cracking

This lecture explains the weaknesses in WEP encryption and how we can use these weaknesses to break it.


In this video we shall learn the basics of cracking WEP encryption , the target is a WEP encrypted network with active clients.


In this lecture we shall learn the theory behind cracking WEP encrypted APs with no or idle clients.

To do this we shall learn three methods of packet injection, but before we can inject packets into the traffic we need to authenticate our wifi card with the target AP so that it does not ignore our requests as AP's only accept packets from associated devices, therefore we shall learn how to fake authenticate our wifi card with the target AP so that it starts accepting packets from us.


This is the first method of cracking idle or client less AP's that we shall learn .

In this method , after successfully associating with the target AP , we will wait for an ARP packet , we will then capture this packet and inject it into the traffic , this will force the AP to generate a new ARP packet with a new IV , we capture this new packet and inject into the traffic again , this process is repeated until the number of IV's captured is sufficient enough to crack the key.


This is the 2nd method of cracking idle or client less AP's.

In this method we will capture an ARP packet and attempt to guess its key stream and use it to forge a new packet (using packetforge-ng) ,then we can inject this new forged packet into the traffic to generate new IV's.


This is the 3rd method of cracking idle or client less AP's.

The goal of this method is to obtain 1500 bytes of the PRGA (pseudo random generation algorithm) , this can be used to forge a new packet which can be injected into the traffic to generate new IV's.

Section 6: Gaining Access - WPA/WPA2 Cracking

This is an introduction to WPA/WPA2 , we shall learn what is the main difference between WPA and WEP and why WPA is more difficult to crack.


In this lecture we shall learn how to exploit the WPS feature to crack WPA/WPA2 encrypted AP's without a wordlist attack and without the need to any connected clients.


In this lecture we shall learn the theory behind cracking WPA/WPA2 encryption.


In this lecture we shall learn how to capture the handshake from the target AP.


To crack WPA/WPA2 we need to use a wordlist attacks , you can download ready wordlists from the internet or create your own by following this lecture.


In this lecture we will use the wordlist created in the previous lecture to crack the WPA key using aircrack-ng.


Computing the PMK is slow, and we only need the wordlist and the essid of the target AP to compute it, therefore we can save time and compute the PMK for our wordlist while waiting for the handshake. This lecture shows how to create a database of ready PMK's for the target AP , so that the cracking process would be much quicker once we capture the handshake.


GPU's are faster than CPU's , there for if you have a powerful GPU you can use hashcat to crack the WPA/WPA2 key using the GPU, this would be much quicker than using aircrack-ng which uses the CPU.

Section 7: Gaining Access - Security & Mitigation
Securing Your Network From The Above Attacks

In this video you will learn how to access the settings page for your router and change the settings to increase the security of your wireless network.

Section 8: Post Connection Attacks

This lecture is an introduction to the last section of this course, it will give you an outline of what we shall learn in this section and some important notes.

Section 9: Post Connection Attacks - Information Gathering

Gathering information is one of the most important steps in penetration testing. In this lecture we will learn how to use netdiscover to discover connected devices to our network.


In this lecture we shall use autoscan to discover connected devices and gather more information about these devices such as open ports and their operating system.


In this lecture we shall learn how to use zenmap (the GUI for nmap) to discover all connected devices and gather detailed information about these devices.

Section 10: Post Connections Attacks - Man In The Middle Attacks (MITM)

In this video we shall learn about one of the most dangerous and effective attacks that you can launch on a network; (Man In The Middle Attacks) , we shall learn the theory behind ARP poisoning and why it is it so dangerous and effective.


In this lecture we will learn how to use arpspoof to do a basic ARP poisoning attack and redirect the flow of packets in the network. 


In this lecture we shall have a look on Man In The Middle Framework , how to use it to ARP poison a target client and sniff usernames and passwords from that target.


In this lecture we shall learn how to bypass HTTPS/SSL so that we can sniff passwords from HTTPS enabled web pages such as facebook and yahoo.


If the user uses the "remember me" feature then we can't sniff the password because they will not enter them , the user will be authenticated using cookies, so in this lecture we shall learn how to sniff these cookies, inject them in the browser and access target user account without having to enter the user name and password.


In this video we shall learn how to control DNS requests made by the target client. This can be very useful in many cases.


This lecture will teach you how to capture screenshots of any computer as long as you are the MITM, you will also learn how to inject a keylogger that will log all key strikes entered by the target .


In this lecture you will learn how to inject HTML or Javascript code into the target browser, this is vey dangerous as it allows us to run a large number of attacks using javascript codes.


BeEF is a browser exploitation framework that allows us to run a large number of commands on hooked browser.

In this lecture we will have an overview of the interface, how to start the framework and how to hook devices in our network to it.

You will also learn how to steal passwords using a fake login screen.


Wireshark is a network protocol analyser, in this lecture we will have a basic overview on it, you will learn why is it useful and how to use it with MITM attacks or use it to analyse a capture file that contains data that you already sniffed.


I this lecture you will learn how to use Wireshark to sniff data (traffic) sent/received by any client in your network. You will also learn how to analyse this data, filter HTTP traffic and find useful information such as the websites visited, sent requests and more!


In this lecture we will continue using Wireshark, you will learn more methods to analyse the captured data, you'll learn how to find packets that contain specific information, how to capture logins (usernames and passwords), and how to capture the cookies if the person has already logged in, we will have examples on Hotmail and Dailymotion.

Section 11: Post Connection Attacks - Gaining Full Control Over Devices On The Same Network

In this lecture you will learn how to create a backdoor that is not detectable by antivirus programs, this is very important in client side attacks as we will be using this backdoor in future videos to try and gain control over the target system.


In this lecture you will learn how to listen for connections coming from the backdoor we generated in the previous lecture.


In this lecture we are going to use a tool called evil-grade to create a fake update and spoof the url that the target program uses to check for updates and get it to redirect to our machine where we have evil grade running, the target program will tell the user that there is a new update available, and when the user agrees to install the new update we will gain full access to their device.


This lecture will show you the basics of metasploit's meterpreter, you will learn how to use it to access the file system of the target computer, upload, download, edit ....etc.

You'll also learn how to migrate to safer process and more.

Section 12: ARP Poisonning Detection & Security

In this lecture we shall learn two methods to detect ARP poisoning attacks.


In this lecture we shall learn how to use Wireshark to detect ARP Poisoning attacks and other suspicious activities in the network, we will also learn how to protect against ARP Poisoning attacks.

Section 13: Bonus Section
Bonus Lecture - Discounts On My Full Ethical Hacking Courses

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Zaid Sabih, Ethical Hacker, Pentester & Computer Scientist

My name is Zaid Al-Quraishi , I am an ethical hacker, pentester and a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. 

I have a very good experience in ethical hacking. I started making video tutorials since 2009 in an ethical hacking website (iSecuri1ty), I received very good feedback for my tutorials which lead to promoting me as an editor in the website. I also work in the penetration testing team of iSecur1ty.

In 2013 I started teaching my first course online in the training center in iSecur1ty, again this course received amazing feedback for learners, which motivated me to create an English version of this course.

The english course was the most popular and the top paid course in Udemy for almost a year, again the feedback was amazing, therefore I decided to make more courses on ethical hacking, so I released a number of other courses which are doing just as good as that one.

My method of teaching is mostly by example, so I usually start by explaining the theory behind each technique, then I show you how it actually works in a real life situation.

Instructor Biography

iSecur1ty LLC, Security solutions company

iSecur1ty is a security solutions company based on Jordan , iSecur1ty provide high quality security solutions for companies and individuals and provide high quality information security courses to improve your security experience.

Ready to start learning?
Take This Course