Learn Network Hacking From Scratch (WiFi & Wired)
4.6 (1,131 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
21,939 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learn Network Hacking From Scratch (WiFi & Wired) to your Wishlist.

Add to Wishlist

Learn Network Hacking From Scratch (WiFi & Wired)

Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.
4.6 (1,131 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
21,939 students enrolled
Last updated 9/2017
English [Auto-generated]
Current price: $10 Original price: $100 Discount: 90% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 5.5 hours on-demand video
  • 2 Articles
  • 4 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • 50 detailed videos about practical attacks against Wi-Fi networks
  • A number of practical attacks that can be used without knowing the key to the target network
  • Control connections of clients around you without knowing the password.
  • Gather detailed information about clients and networks like their OS, opened ports ...etc.
  • Crack WEP/WPA/WPA2 encryptions using a number of methods.
  • ARP Spoofing/ARP Poisonning
  • Launch Various Man In The Middle attacks.
  • Gain access to any account accessed by any client in your network.
  • Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.
  • Detect ARP poisoning and protect your self and your network against it.
  • You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc.
  • Combine individual attacks to launch even more powerful attacks.
View Curriculum
  • Basic IT skills
  • Wireless adapter (for the wifi cracking section ONLY) - ALFA AWUS036NHA and TP-LINK TL-WN722n are the recommended ones.
  • Kali Linux (can be download for free from http://www.kali.org/downloads/)

This course was last updated on 29/12/2016

Welcome to my comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab. 

The course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.. This course will take you from a beginner to a more advanced level.

The Course is Divided into three main sections:

  1. Pre-connection: in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card and you will learn a number of attacks that you can launch without the need to know the password such as controlling all the connections around you (ie: deny/allow any device from connecting to any network), you will also learn how to create a fake access point to attract users to connect to it and capture any important information they enter such as usernames and passwords.
  2. Gaining Access: Now that you have gathered information about all the networks around you, and found your target, you will learn how to crack the key that the target uses. In this section you will learn a number of methods to crack WEP/WPA/WPA2 encryption.
  3. Post Connection: Now you have the key to your target network and you can connect to it. in this section you will learn a number of very powerful attacks that you can launch against the network and the connected clients, these attacks will allow you to gain access to any account accessed by any client connected to your network, read all the traffic used by these clients (images , videos , audio passwords ...etc), and gain full control over any client in your network . After that you will learn how to detect these attacks and protect yourself and your network against them.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...ect.). Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

Note: All the videos in this course are downloadable.

NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

Who is the target audience?
  • Anybody who is interested in learning about network penetration testing
  • Anybody interested into learning how to protect networks from hackers.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
59 Lectures
Introduction & Course Outline
1 Lecture 03:35

Welcome to the course, this lecture will give you a full outline of the structure of the course, and will give you an over view of what will you learn in each section.

Preview 03:35
Preparation - Setting Up The Lab
5 Lectures 29:01

This lecture will give you an overview of what software you need to install for this course, and how it can be installed.

You will also see how to install Kali as a virtual machine.

Preview 08:32

In this lecture you will learn how to set up a windows virtual machine so that we can try and hack into it to practice penetration testing.

Installing Windows As a Virtual machine

In this lecture, you will learn how to store the current state of the virtual machines and how to use these restore points.

Preview 06:08

In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.

You will also learn how to connect your external wifi card to the virtual machine, this is extremely important for future videos.

Preview 07:05

In this lecture you will learn how to install programs on Kali, update the sources and upgrade the system.

Checkout the links in the resources if you face any issues after upgrading.

Updating Sources & Installing Programs
Network Basics
6 Lectures 26:05

In this lecture we shall talk about some basics that we need to understand before we can start learning how to test network's security.

Network Basics

This video will teach you how to connect a USB device to Kali, as an example I will be connecting a wireless adapter to it so I can interact with wireless networks and try to hack them form Kali.

Connecting a Wireless Adapter To Kali

In this lecture you shall learn what do mean by MAC address, what are they used for and how to change your MAC address.

MAC Address - What Is It & How To Change It

This lecture will clarify why is it possible to capture any packet around us even if it's not directed to our device, you will learn about two wireless modes: monitor and managed mode, you shall learn what is the difference between them, when do we use each of them and how to correctly enable monitor mode on your wireless card.

Wireless Modes (Managed & Monitor mode)

Since the last update of Aircrack-ng which comes pre installed with Kali 2, arimon-ng stopped working for some wifi cards, therefore if it does not work for you, I recommend using this method to enable monitor mode.
Enabling Monitor Mode Manually (2nd method)

This video shows another method that can be used to enable monitor mode just incase the method explained in the previous lectures did not enable it properly for you.

Enabling Monitor Mode Using airmon-ng (3rd method)
Pre-Connection Attacks
6 Lectures 42:04

This is the first lecture in the "pre connection section", in this lecture you will learn how to use airodump-ng to see all the access points and associated clients that are within your wireless range and gather information about them.

Packet Sniffing Basics Using Airodump-ng

In this lecture , we shall learn how to launch airodump-ng on a specific AP , and store all packets in a capture file.

Targeted Packet Sniffing Using Airodump-ng

Deauthentication attacks allow us to disconnect (disassociate) any connected client to any network that is within our wifi range even if the network uses encryption (such as WEP/WPA/WPA2).

Deauthentication Attack (Disconnecting Any Device From The Network)

Fake access points can be handy in many scenarios , one example is creating an open AP , this will attract a lot of clients , many of which will automatically connect to it. Then we can sniff all the traffic created by the clients that connect to it , and since its open , the traffic will not be encrypted !

This lecture will explain the theory behind creating a fake AP and what do we need to make it work.

Creating a Fake Access Point - Theory

In this lecture we shall see how we can create a fake AP using Kali linux.

Creating a Fake Access Point - Practical

In this lecture you will learn an easier way to create a fake AP using a tool called Mana-Toolkit.

Creating a Fake AP Using Mana-Toolkit
Gaining Access
1 Lecture 01:16

Welcome to this section of the course , in this section we shall learn how to break WEP/WPA/WPA2 encryption and determine the network key.

Preview 01:16
Gaining Access - WEP Cracking
6 Lectures 36:59

This lecture explains the weaknesses in WEP encryption and how we can use these weaknesses to break it.

Theory Behind Cracking WEP Encryption

In this video we shall learn the basics of cracking WEP encryption , the target is a WEP encrypted network with active clients.

Basic Case

In this lecture we shall learn the theory behind cracking WEP encrypted APs with no or idle clients.

To do this we shall learn three methods of packet injection, but before we can inject packets into the traffic we need to authenticate our wifi card with the target AP so that it does not ignore our requests as AP's only accept packets from associated devices, therefore we shall learn how to fake authenticate our wifi card with the target AP so that it starts accepting packets from us.

Associating With Target Network Using Fake Authentication Attack

This is the first method of cracking idle or client less AP's that we shall learn .

In this method , after successfully associating with the target AP , we will wait for an ARP packet , we will then capture this packet and inject it into the traffic , this will force the AP to generate a new ARP packet with a new IV , we capture this new packet and inject into the traffic again , this process is repeated until the number of IV's captured is sufficient enough to crack the key.

Packet Injection - ARP Request Reply Attack

This is the 2nd method of cracking idle or client less AP's.

In this method we will capture an ARP packet and attempt to guess its key stream and use it to forge a new packet (using packetforge-ng) ,then we can inject this new forged packet into the traffic to generate new IV's.

Packet Injection - Korek Chopchop Attack

This is the 3rd method of cracking idle or client less AP's.

The goal of this method is to obtain 1500 bytes of the PRGA (pseudo random generation algorithm) , this can be used to forge a new packet which can be injected into the traffic to generate new IV's.

Packet Injection - Fragmentation Attack
Gaining Access - WPA/WPA2 Cracking
8 Lectures 39:00

This is an introduction to WPA/WPA2 , we shall learn what is the main difference between WPA and WEP and why WPA is more difficult to crack.

What is WPA & How Does It Work ?

In this lecture we shall learn how to exploit the WPS feature to crack WPA/WPA2 encrypted AP's without a wordlist attack and without the need to any connected clients.

Exploiting the WPS Feature

In this lecture we shall learn the theory behind cracking WPA/WPA2 encryption.

Theory Behind Cracking WPA/WPA2 Encryption

In this lecture we shall learn how to capture the handshake from the target AP.

How to Capture a Handshake

To crack WPA/WPA2 we need to use a wordlist attacks , you can download ready wordlists from the internet or create your own by following this lecture.

Creating a Wordlist / Dictionary

In this lecture we will use the wordlist created in the previous lecture to crack the WPA key using aircrack-ng.

Cracking the Key Using a Wordlist Attack

Computing the PMK is slow, and we only need the wordlist and the essid of the target AP to compute it, therefore we can save time and compute the PMK for our wordlist while waiting for the handshake. This lecture shows how to create a database of ready PMK's for the target AP , so that the cracking process would be much quicker once we capture the handshake.

Cracking the Key Quicker using a Rainbow Table

GPU's are faster than CPU's , there for if you have a powerful GPU you can use hashcat to crack the WPA/WPA2 key using the GPU, this would be much quicker than using aircrack-ng which uses the CPU.

Quicker Wordlist Attack using the GPU
Gaining Access - Security & Mitigation
2 Lectures 08:28
Securing Your Network From The Above Attacks

In this video you will learn how to access the settings page for your router and change the settings to increase the security of your wireless network.

How to Configure Wireless Security Settings To Secure Your Network
Post Connection Attacks
1 Lecture 02:44

This lecture is an introduction to the last section of this course, it will give you an outline of what we shall learn in this section and some important notes.

Preview 02:44
Post Connection Attacks - Information Gathering
3 Lectures 23:28

Gathering information is one of the most important steps in penetration testing. In this lecture we will learn how to use netdiscover to discover connected devices to our network.

Discovering Connected Clients using netdiscover

In this lecture we shall use autoscan to discover connected devices and gather more information about these devices such as open ports and their operating system.

Gathering More Information Using Autoscan

In this lecture we shall learn how to use zenmap (the GUI for nmap) to discover all connected devices and gather detailed information about these devices.

Even More Detailed Information Gathering Using Nmap
4 More Sections
About the Instructor
Zaid Sabih
4.6 Average rating
12,729 Reviews
88,595 Students
9 Courses
Ethical Hacker, Pentester & Computer Scientist

My name is Zaid Al-Quraishi , I am an ethical hacker, pentester and a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. 

I have a very good experience in ethical hacking. I started making video tutorials since 2009 in an ethical hacking website (iSecuri1ty), I received very good feedback for my tutorials which lead to promoting me as an editor in the website. I also work in the penetration testing team of iSecur1ty.

In 2013 I started teaching my first course online in the training center in iSecur1ty, again this course received amazing feedback for learners, which motivated me to create an English version of this course.

The english course was the most popular and the top paid course in Udemy for almost a year, again the feedback was amazing, therefore I decided to make more courses on ethical hacking, so I released a number of other courses which are doing just as good as that one.

My method of teaching is mostly by example, so I usually start by explaining the theory behind each technique, then I show you how it actually works in a real life situation.

iSecur1ty LLC
4.6 Average rating
1,128 Reviews
21,939 Students
1 Course
Security solutions company

iSecur1ty is a security solutions company based on Jordan , iSecur1ty provide high quality security solutions for companies and individuals and provide high quality information security courses to improve your security experience.