01-What-is-ARP-Poisoning-(9-04-)
02-Intercepting-Network-Traffic-(6-30-)
03-Bettercap-Basics-(7-43-)
04-ARP-Spoofing-Using-Bettercap-(8-17-)
05-Spying-on-Network-Devices-(Capturing-Passwords,-Visited-Websites...etc)-(5-11-)
06-Creating-Custom-Spoofing-Script-(9-42-)
07-Bypassing-HTTPS-(11-12-)
08-Bypassing-HSTS-(10-08-)
09-Bypassing-HSTS-Recap---Firefox-(9-46-)
10-Bypassing-HSTS-Recap---Chrome-(6-50-)
11-DNS-Spoofing---Controlling-DNS-Requests-on-The-Network-(10-51-)
12-Injecting-Javascript-Code-(10-26-)
13-Doing-All-of-The-Above-Using-a-Graphical-Interface-(10-29-)
14-Wireshark---Basic-Overview-&-How-To-Use-It-With-MITM-Attacks-(8-24-)
15-Wireshark---Sniffing-&-Analysing-Data-(5-30-)
16-Wireshark---Using-Filters,-Tracing-&-Dissecting-Packets-(6-28-)
17-Wireshark---Capturing-Passwords-&-Anything-Sent-By-Any-Device-In-The-Network-(7-48-)
18-Creating-a-Fake-Access-Point-(Honeypot)---Theory-(7-29-)
19-Creating-a-Fake-Access-Point-(Honeypot)---Practical-(9-33-)
07-Bypassing-HTTPS-(11-12-) hstshijack-v2.0.zip