وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learn Network Hacking From Scratch (WiFi & Wired)

سرفصل های دوره

Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.


01-Training-Overview
  • 01-Description-of-Training.html
  • 02-Video-Overview-(2-19-)

  • 02-Section-0
  • 01-Introduction-&-Course-Outline-(3-35-)

  • 03-Section-1.-Preparation---Setting-Up-The-Lab
  • 01-Lab-Overview-&-Needed-Software-(5-54-)
  • 01-Lab-Overview-&-Needed-Software-(5-54-).pdf
  • 02-Initial-Preparation-(9-12-)
  • 03-Installing-Kali-Linux-as-a-VM-on-Windows-(9-16-)
  • 04-Installing-Kali-Linux-as-a-VM-on-Apple-Mac-OS-(9-24-)
  • 05-Installing-Kali-Linux-as-a-VM-on-Linux-(10-41-)
  • 06-Kali-Linux-Overview-(5-22-)
  • 07-The-Linux-Terminal-&-Basic-Commands-(13-06-)

  • 04-Section-2.-Network-Basics
  • 01-Network-Basics-(4-28-)
  • 01-Network-Basics-(4-28-).pdf
  • 02-Connecting-a-Wireless-Adapter-To-Kali-(6-51-)
  • 02-Connecting-a-Wireless-Adapter-To-Kali-(6-51-).txt
  • 03-MAC-Address---What-Is-It-&-How-To-Change-It-(8-20-)
  • 03-MAC-Address---What-Is-It-&-How-To-Change-It-(8-20-).txt
  • 04-Wireless-Modes-(Managed-&-Monitor-mode)-(6-57-)
  • 04-Wireless-Modes-(Managed-&-Monitor-mode)-(6-57-).txt

  • 05-Section-3.-Pre-Connection-Attacks
  • 01-Packet-Sniffing-Basics-Using-Airodump-ng-(6-40-)
  • 01-Packet-Sniffing-Basics-Using-Airodump-ng-(6-40-).pdf
  • 02-WiFi-Bands---2.4Ghz-&-5Ghz-Frequencies-(7-54-)
  • 03-Targeted-Packet-Sniffing-Using-Airodump-ng-(10-30-)
  • 04-Deauthentication-Attack-(Disconnecting-Any-Device-From-The-Network)-(6-50-)

  • 06-Section-4.-Gaining-Access
  • 01-Gaining-Access-Introduction-(1-09-)
  • 01-Gaining-Access-Introduction-(1-09-).pdf

  • 07-Section-5.-Gaining-Access---WEP-Cracking
  • 01-Theory-Behind-Cracking-WEP-Encryption-(5-47-)
  • 02-Basic-Case-(6-17-)
  • 03-Associating-With-Target-Network-Using-Fake-Authentication-Attack-(6-45-)
  • 04-Packet-Injection---ARP-Request-Reply-Attack-(6-09-)
  • 05-Packet-Injection---Korek-Chopchop-Attack-(7-42-)
  • 06-Packet-Injection---Fragmentation-Attack-(7-44-)

  • 08-Section-6.-Gaining-Access---WPA-WPA2-Cracking
  • 01-Introduction-to-WPA-WPA2-Cracking-(3-42-)
  • 02-Exploiting-the-WPS-Feature-(8-17-)
  • 03-How-to-Capture-a-Handshake-(6-49-)
  • 04-Creating-a-Wordlist-Dictionary-(7-33-)
  • 05-Cracking-the-Key-Using-a-Wordlist-Attack-(6-26-)
  • 06-Cracking-the-Key-Quicker-using-a-Rainbow-Table-(7-00-)
  • 07-Cracking-WPAWPA2-Much-Faster-Using-GPU---Part-1-(7-19-)
  • 08-Cracking-WPAWPA2-Much-Faster-Using-GPU---Part-2-(10-38-)
      02-Exploiting-the-WPS-Feature-(8-17-)
    • reaver.zip
      04-Creating-a-Wordlist-Dictionary-(7-33-)
    • Some-Links-To-Wordlists.txt

  • 09-Section-7.-Gaining-Access---Security-&-Mitigation
  • 01-Securing-Your-Network-From-The-Above-Attacks.html
  • 02-How-to-Configure-Wireless-Security-Settings-To-Secure-Your-Network-(8-05-)

  • 10-Section-8.-Post-Connection-Attacks
  • 01-Post-Connection-Attacks-Introduction-(2-10-)
  • 02-Installing-Windows-As-a-Virtual-machine-(5-44-)
  • 03-Installing-Windows-as-a-Virtual-Machine-on-Apple-Silicon-Computers-(4-53-)
      01-Post-Connection-Attacks-Introduction-(2-10-)
    • Network-Pentesting-Post-Connection-Attacks.pdf
    • Post Connection Attacks.pdf
      02-Installing-Windows-As-a-Virtual-machine-(5-44-)
    • MSEdge-Win10-VMware.7z
      03-Installing-Windows-as-a-Virtual-Machine-on-Apple-Silicon-Computers-(4-53-)
    • external-links.txt

  • 11-Section-9.-Post-Connection-Attacks---Information-Gathering
  • 01-Discovering-Connected-Clients-using-netdiscover-(8-39-)
  • 01-Discovering-Connected-Clients-using-netdiscover-(8-39-).pdf
  • 02-Gathering-More-Information-Using-Zenmap-(6-45-)
  • 03-Gathering-Even-More-Information-Using-Zenmap-(8-08-)

  • 12-Section-10.-Post-Connections-Attacks---Man-In-The-Middle-Attacks-(MITM)
  • 01-ARP-Poisoning-Theory-(9-04-)
  • 02-ARP-Poisoning-Using-arpspoof-(6-30-)
  • 03-Bettercap-Basics-(8-39-)
  • 04-ARP-Poisoning-Using-Bettercap-(8-17-)
  • 05-Spying-on-Network-Devices-(Capturing-Passwords,-Visited-Websites...etc)-(5-11-)
  • 06-Creating-Custom-Spoofing-Script-(9-54-)
  • 07-Bypassing-HTTPS-(11-12-)
  • 08-Bypassing-HSTS-(10-08-)
  • 09-DNS-Spoofing---Redirecting-Requests-From-One-Website-To-Another-(10-51-)
  • 10-Injecting-Javascript-Code-(10-26-)
  • 11-Running-all-the-Above-Using-a-Graphical-Interface-(10-30-)
  • 12-Wireshark---Basic-Overview-&-How-To-Use-It-With-MITM-Attacks-(8-24-)
  • 13-Wireshark---Sniffing-&-Analysing-Data-(5-30-)
  • 14-Wireshark---Using-Filters,-Tracing-&-Dissecting-Packets-(6-28-)
  • 15-Wireshark---Capturing-Passwords-&-Anything-Sent-By-Any-Device-In-The-Network-(7-48-)
  • 16-Creating-a-Fake-Access-Point---Theory-(7-29-)
  • 17-Creating-a-Fake-AP-Using-Mana-Toolkit-(9-31-)
      Injecting-Javascript-Code-(10-26-).mp4
    • inject beef.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43303
    حجم: 8230 مگابایت
    مدت زمان: 421 دقیقه
    تاریخ انتشار: ۶ بهمن ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید