This course was last updated on 29/12/2016
Welcome to my comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.
The course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.. This course will take you from a beginner to a more advanced level.
The Course is Divided into three main sections:
All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.
Note: All the videos in this course are downloadable.
NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.
This lecture will give you an overview of what software you need to install for this course, and how it can be installed.
You will also see how to install Kali as a virtual machine.
In this lecture you will learn how to set up a windows virtual machine so that we can try and hack into it to practice penetration testing.
In this lecture, you will learn how to store the current state of the virtual machines and how to use these restore points.
In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.
You will also learn how to connect your external wifi card to the virtual machine, this is extremely important for future videos.
In this lecture you will learn how to install programs on Kali, update the sources and upgrade the system.
Checkout the links in the resources if you face any issues after upgrading.
In this lecture we shall talk about some basics that we need to understand before we can start learning how to test network's security.
This video will teach you how to connect a USB device to Kali, as an example I will be connecting a wireless adapter to it so I can interact with wireless networks and try to hack them form Kali.
In this lecture you shall learn what do mean by MAC address, what are they used for and how to change your MAC address.
This lecture will clarify why is it possible to capture any packet around us even if it's not directed to our device, you will learn about two wireless modes: monitor and managed mode, you shall learn what is the difference between them, when do we use each of them and how to correctly enable monitor mode on your wireless card.
This video shows another method that can be used to enable monitor mode just incase the method explained in the previous lectures did not enable it properly for you.
This is the first lecture in the "pre connection section", in this lecture you will learn how to use airodump-ng to see all the access points and associated clients that are within your wireless range and gather information about them.
In this lecture , we shall learn how to launch airodump-ng on a specific AP , and store all packets in a capture file.
Deauthentication attacks allow us to disconnect (disassociate) any connected client to any network that is within our wifi range even if the network uses encryption (such as WEP/WPA/WPA2).
Fake access points can be handy in many scenarios , one example is creating an open AP , this will attract a lot of clients , many of which will automatically connect to it. Then we can sniff all the traffic created by the clients that connect to it , and since its open , the traffic will not be encrypted !
This lecture will explain the theory behind creating a fake AP and what do we need to make it work.
In this lecture we shall see how we can create a fake AP using Kali linux.
In this lecture you will learn an easier way to create a fake AP using a tool called Mana-Toolkit.
This lecture explains the weaknesses in WEP encryption and how we can use these weaknesses to break it.
In this video we shall learn the basics of cracking WEP encryption , the target is a WEP encrypted network with active clients.
In this lecture we shall learn the theory behind cracking WEP encrypted APs with no or idle clients.
To do this we shall learn three methods of packet injection, but before we can inject packets into the traffic we need to authenticate our wifi card with the target AP so that it does not ignore our requests as AP's only accept packets from associated devices, therefore we shall learn how to fake authenticate our wifi card with the target AP so that it starts accepting packets from us.
This is the first method of cracking idle or client less AP's that we shall learn .
In this method , after successfully associating with the target AP , we will wait for an ARP packet , we will then capture this packet and inject it into the traffic , this will force the AP to generate a new ARP packet with a new IV , we capture this new packet and inject into the traffic again , this process is repeated until the number of IV's captured is sufficient enough to crack the key.
This is the 2nd method of cracking idle or client less AP's.
In this method we will capture an ARP packet and attempt to guess its key stream and use it to forge a new packet (using packetforge-ng) ,then we can inject this new forged packet into the traffic to generate new IV's.
This is the 3rd method of cracking idle or client less AP's.
The goal of this method is to obtain 1500 bytes of the PRGA (pseudo random generation algorithm) , this can be used to forge a new packet which can be injected into the traffic to generate new IV's.
This is an introduction to WPA/WPA2 , we shall learn what is the main difference between WPA and WEP and why WPA is more difficult to crack.
In this lecture we shall learn how to exploit the WPS feature to crack WPA/WPA2 encrypted AP's without a wordlist attack and without the need to any connected clients.
In this lecture we shall learn the theory behind cracking WPA/WPA2 encryption.
In this lecture we shall learn how to capture the handshake from the target AP.
To crack WPA/WPA2 we need to use a wordlist attacks , you can download ready wordlists from the internet or create your own by following this lecture.
In this lecture we will use the wordlist created in the previous lecture to crack the WPA key using aircrack-ng.
Computing the PMK is slow, and we only need the wordlist and the essid of the target AP to compute it, therefore we can save time and compute the PMK for our wordlist while waiting for the handshake. This lecture shows how to create a database of ready PMK's for the target AP , so that the cracking process would be much quicker once we capture the handshake.
GPU's are faster than CPU's , there for if you have a powerful GPU you can use hashcat to crack the WPA/WPA2 key using the GPU, this would be much quicker than using aircrack-ng which uses the CPU.
In this video you will learn how to access the settings page for your router and change the settings to increase the security of your wireless network.
Gathering information is one of the most important steps in penetration testing. In this lecture we will learn how to use netdiscover to discover connected devices to our network.
In this lecture we shall use autoscan to discover connected devices and gather more information about these devices such as open ports and their operating system.
In this lecture we shall learn how to use zenmap (the GUI for nmap) to discover all connected devices and gather detailed information about these devices.
My name is Zaid Al-Quraishi , I am an ethical hacker, pentester and a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.
I have a very good experience in ethical hacking. I started making video tutorials since 2009 in an ethical hacking website (iSecuri1ty), I received very good feedback for my tutorials which lead to promoting me as an editor in the website. I also work in the penetration testing team of iSecur1ty.
In 2013 I started teaching my first course online in the training center in iSecur1ty, again this course received amazing feedback for learners, which motivated me to create an English version of this course.
The english course was the most popular and the top paid course in Udemy for almost a year, again the feedback was amazing, therefore I decided to make more courses on ethical hacking, so I released a number of other courses which are doing just as good as that one.
My method of teaching is mostly by example, so I usually start by explaining the theory behind each technique, then I show you how it actually works in a real life situation.
iSecur1ty is a security solutions company based on Jordan , iSecur1ty provide high quality security solutions for companies and individuals and provide high quality information security courses to improve your security experience.