وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learn Network Hacking From Scratch (WiFi & Wired)

سرفصل های دوره

Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.


01-Training-Overview
  • 01-Description-of-Training.html
  • 02-Video-Overview-(2-19-)

  • 02-Section-0
  • 01-Introduction-&-Course-Outline-(3-35-)

  • 03-Section-1.-Preparation---Setting-Up-The-Lab
  • 01-Lab-Overview-&-Needed-Software-(5-54-)
  • 01-Lab-Overview-&-Needed-Software-(5-54-).pdf
  • 02-Initial-Preparation-(9-12-)
  • 03-Installing-Kali-Linux-as-a-VM-on-Windows-(9-16-)
  • 04-Installing-Kali-Linux-as-a-VM-on-Apple-Mac-OS-(9-24-)
  • 05-Installing-Kali-Linux-as-a-VM-on-Linux-(10-41-)
  • 06-Kali-Linux-Overview-(5-22-)
  • 07-The-Linux-Terminal-&-Basic-Commands-(13-06-)

  • 04-Section-2.-Network-Basics
  • 01-Network-Basics-(4-28-)
  • 01-Network-Basics-(4-28-).pdf
  • 02-Connecting-a-Wireless-Adapter-To-Kali-(6-51-)
  • 02-Connecting-a-Wireless-Adapter-To-Kali-(6-51-).txt
  • 03-MAC-Address---What-Is-It-&-How-To-Change-It-(8-20-)
  • 03-MAC-Address---What-Is-It-&-How-To-Change-It-(8-20-).txt
  • 04-Wireless-Modes-(Managed-&-Monitor-mode)-(6-57-)
  • 04-Wireless-Modes-(Managed-&-Monitor-mode)-(6-57-).txt

  • 05-Section-3.-Pre-Connection-Attacks
  • 01-Packet-Sniffing-Basics-Using-Airodump-ng-(6-40-)
  • 01-Packet-Sniffing-Basics-Using-Airodump-ng-(6-40-).pdf
  • 02-WiFi-Bands---2.4Ghz-&-5Ghz-Frequencies-(7-54-)
  • 03-Targeted-Packet-Sniffing-Using-Airodump-ng-(10-30-)
  • 04-Deauthentication-Attack-(Disconnecting-Any-Device-From-The-Network)-(6-50-)

  • 06-Section-4.-Gaining-Access
  • 01-Gaining-Access-Introduction-(1-09-)
  • 01-Gaining-Access-Introduction-(1-09-).pdf

  • 07-Section-5.-Gaining-Access---WEP-Cracking
  • 01-Theory-Behind-Cracking-WEP-Encryption-(5-47-)
  • 02-Basic-Case-(6-17-)
  • 03-Associating-With-Target-Network-Using-Fake-Authentication-Attack-(6-45-)
  • 04-Packet-Injection---ARP-Request-Reply-Attack-(6-09-)
  • 05-Packet-Injection---Korek-Chopchop-Attack-(7-42-)
  • 06-Packet-Injection---Fragmentation-Attack-(7-44-)

  • 08-Section-6.-Gaining-Access---WPA-WPA2-Cracking
  • 01-Introduction-to-WPA-WPA2-Cracking-(3-42-)
  • 02-Exploiting-the-WPS-Feature-(8-17-)
  • 03-How-to-Capture-a-Handshake-(6-49-)
  • 04-Creating-a-Wordlist-Dictionary-(7-33-)
  • 05-Cracking-the-Key-Using-a-Wordlist-Attack-(6-26-)
  • 06-Cracking-the-Key-Quicker-using-a-Rainbow-Table-(7-00-)
  • 07-Cracking-WPAWPA2-Much-Faster-Using-GPU---Part-1-(7-19-)
  • 08-Cracking-WPAWPA2-Much-Faster-Using-GPU---Part-2-(10-38-)
      02-Exploiting-the-WPS-Feature-(8-17-)
    • reaver.zip
      04-Creating-a-Wordlist-Dictionary-(7-33-)
    • Some-Links-To-Wordlists.txt

  • 09-Section-7.-Gaining-Access---Security-&-Mitigation
  • 01-Securing-Your-Network-From-The-Above-Attacks.html
  • 02-How-to-Configure-Wireless-Security-Settings-To-Secure-Your-Network-(8-05-)

  • 10-Section-8.-Post-Connection-Attacks
  • 01-Post-Connection-Attacks-Introduction-(2-10-)
  • 02-Installing-Windows-As-a-Virtual-machine-(5-44-)
  • 03-Installing-Windows-as-a-Virtual-Machine-on-Apple-Silicon-Computers-(4-53-)
      01-Post-Connection-Attacks-Introduction-(2-10-)
    • Network-Pentesting-Post-Connection-Attacks.pdf
    • Post Connection Attacks.pdf
      02-Installing-Windows-As-a-Virtual-machine-(5-44-)
    • MSEdge-Win10-VMware.7z
      03-Installing-Windows-as-a-Virtual-Machine-on-Apple-Silicon-Computers-(4-53-)
    • external-links.txt

  • 11-Section-9.-Post-Connection-Attacks---Information-Gathering
  • 01-Discovering-Connected-Clients-using-netdiscover-(8-39-)
  • 01-Discovering-Connected-Clients-using-netdiscover-(8-39-).pdf
  • 02-Gathering-More-Information-Using-Zenmap-(6-45-)
  • 03-Gathering-Even-More-Information-Using-Zenmap-(8-08-)

  • 12-Section-10.-Post-Connections-Attacks---Man-In-The-Middle-Attacks-(MITM)
  • 01-ARP-Poisoning-Theory-(9-04-)
  • 02-ARP-Poisoning-Using-arpspoof-(6-30-)
  • 03-Bettercap-Basics-(8-39-)
  • 04-ARP-Poisoning-Using-Bettercap-(8-17-)
  • 05-Spying-on-Network-Devices-(Capturing-Passwords,-Visited-Websites...etc)-(5-11-)
  • 06-Creating-Custom-Spoofing-Script-(9-54-)
  • 07-Bypassing-HTTPS-(11-12-)
  • 08-Bypassing-HSTS-(10-08-)
  • 09-DNS-Spoofing---Redirecting-Requests-From-One-Website-To-Another-(10-51-)
  • 10-Injecting-Javascript-Code-(10-26-)
  • 11-Running-all-the-Above-Using-a-Graphical-Interface-(10-30-)
  • 12-Wireshark---Basic-Overview-&-How-To-Use-It-With-MITM-Attacks-(8-24-)
  • 13-Wireshark---Sniffing-&-Analysing-Data-(5-30-)
  • 14-Wireshark---Using-Filters,-Tracing-&-Dissecting-Packets-(6-28-)
  • 15-Wireshark---Capturing-Passwords-&-Anything-Sent-By-Any-Device-In-The-Network-(7-48-)
  • 16-Creating-a-Fake-Access-Point---Theory-(7-29-)
  • 17-Creating-a-Fake-AP-Using-Mana-Toolkit-(9-31-)
      Injecting-Javascript-Code-(10-26-).mp4
    • inject beef.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43303
    حجم: 8230 مگابایت
    مدت زمان: 421 دقیقه
    تاریخ انتشار: ۶ بهمن ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید