Pay What You Want: White Hat Hacker Training Bundle

6 Reviews
7 Courses
-

Pay What You Want: White Hat Hacker Training Bundle

6 Reviews
7 Courses
-

How It Works

Beat the Leader's price and get featured on the Leaderboard!

Beat the average price and you'll take home the entire bundle.

If what you pay is less than the average, you'll still take home something great.

Price locked in for: 15:00
Beat the average price$13.97
Pay what you want

What's Included In This Bundle ($1115) Value

Certified Information Systems Security Professional
$250.00 ValueCertified Information Systems Security Professional
Learn Ethical Hacking from Scratch
$180.00 ValueLearn Ethical Hacking from Scratch
The Complete Nmap Ethical Hacking Course: Network Security
$99.99 ValueThe Complete Nmap Ethical Hacking Course: Network Security
How to Hack WiFi Networks for Beginners
$99.99 ValueHow to Hack WiFi Networks for Beginners
Web Hacking for Beginners
$99.99 ValueWeb Hacking for Beginners
The Complete Ethical Hacking Course: Beginner to Advanced 2.0
$194.99 ValueThe Complete Ethical Hacking Course: Beginner to Advanced 2.0
Network Hacking Continued: Intermediate to Advanced
$189.99 ValueNetwork Hacking Continued: Intermediate to Advanced
ZR

Zachory Ray

$100.00

Leaderboard Champion

Rank
User
Paid
2
MS
Morgan Smith
$100.00
3
CP
Chandima Perera
$70.50
4
WT
William Torgerson
$70.00
5
CS
Clay Skidmore
$62.00
6
GH
Gilbert Houston
$61.00
7
MS
Michael Stevenson
$60.00
8
RT
Robert Thomas
$55.00
9
KO
Keith Olson
$50.00
10
LM
Linda Marie Franchell
$50.00

Product Details

  • Certification included
  • Experience level required: Advanced
  • Access 83 lectures & 10 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

83 Lessons (10h)

  • Introduction
    Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 106:41
    Course Overview5:24
  • Back To Basics/Pre-Connection Attacks
    Pre-connection Attacks Overview1:54
    Spoofing MAC Address Manually3:24
    Targeting 5Ghz Networks6:43
    Deauthenticating a Client From Protected WiFi Networks6:54
    Deauthenticating Multiple Clients From Protected WiFi Networks7:50
    Deauthenticating All Clients From Protected WiFi Network6:04
  • Gaining Access
    Gaining Access Overview2:29
    Discovering Names of Hidden Networks8:11
    Connecting To Hidden Networks5:14
    Bypassing Mac Filtering (Blacklists & Whitelists)9:04
    Cracking SKA WEP Networks9:05
    Securing Systems From The Above Attacks3:17
  • Gaining Access - Captive Portals
    Sniffing Captive Portal Login Information In Monitor Mode9:59
    Sniffing Captive Portal Login Information Using ARP Spoofing8:55
    Creating a Fake Captive Portal - Introduction4:18
    Creating Login Page - Cloning a Login Page7:17
    Creating Login Page - Fixing Relative Links6:53
    Creating Login Page - Adding Form Tag7:44
    Creating Login Page - Adding Submit Button6:44
    Preparing Computer To Run Fake Captive Portal7:57
    Starting The Fake Captive Portal11:57
    Redirecting Requests To Captive Portal Login Page12:19
    Generating Fake SSL Certificate5:54
    Enabling SSL/HTTPS On Webserver7:50
    Sniffing & Analysing Login Credentials6:03
  • Gaining Access - WPA/WPA2 Cracking - Exploiting WPS
    Exploiting WPS - Introduction1:34
    Bypassing "Failed to associate" Issue7:39
    Bypassing 0x3 and 0x4 Errors7:39
    WPS Lock - What Is It & How To Bypass It7:01
    Unlocking WPS8:40
  • Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack
    Advanced Wordlist Attacks - Introduction1:39
    Saving Aircrack-ng Cracking Progress9:44
    Using Huge Wordlists With Aircrack-ng Without Wasting Storage7:35
    Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage10:04
    Cracking WPA/WPA2 Much Faster Using GPU - Part 17:19
    Cracking WPA/WPA2 Much Faster Using GPU - Part 210:39
  • Gaining Access - WPA/WPA Cracking - Evil Twin Attack
    What is it & How it Works7:21
    Installing Needed Software7:39
    Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing9:38
    Debugging & Fixing Login Interface11:51
  • Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise
    What is WPA/WPA2 Enterprise & How it Works5:24
    How To Hack WPA/WPA2 Enterprise6:47
    Stealing Login Credentials8:11
    Cracking Login Credentials6:38
    Securing Systems From The Above Gaining Access Attacks4:59
  • Post Connection Attacks
    Post Connection Attacks Overview4:22
    Ettercap - Basic Overview7:09
    Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords9:51
    Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites12:44
    Automatically ARP Poisoning New Clients6:53
    DNS Spoofing Using Ettercap5:30
    Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms9:17
  • Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
    MITMproxy - What is It & How To Install It3:47
    Using MITMproxy In Explicit Mode7:12
    Analysing (Filtering & Highlighting) Flows5:13
    Intercepting Network Flows4:51
    Modifying Responses & Injecting Javascript Manually8:45
    Intercepting & Modifying Responses In Transparent Mode7:31
    Editing Responses & Injecting BeEF's Code On The Fly9:16
    Editing Responses Automatically Based On Regex9:13
    [Bonus] - Stealing Login Info Using Fake Login Prompt7:12
    [Bonus] - Hacking Windows 10 Using A Fake Update4:41
  • Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
    What Do Mean By MITM Scripts?6:14
    Capturing & Printing Requests/Responses8:30
    Filtering Flows & Extracting Useful Data9:25
    Using Conditions To Execute Code On Useful Flows9:48
    Generating Custom HTTP Responses8:35
    Testing Script Locally8:29
    Generating Trojans - Installing The Trojan Factory6:16
    Generating Trojans - Converting Any File (eg:image) To a Trojan10:15
    Testing Script On Remote Computer To Replace Downloads With a Generic Trojan7:07
    Executing Bash Commands & Calling Trojan Factory From Our Script8:47
    Using Variables & More Complex Conditions8:42
    Converting Downloads To Trojans On The Fly10:10
    Configuring The Trojan Factory's MITMproxy Script7:32
    Using The Trojan Factory MITMproxy Script7:48
  • Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
    Bypassing HTTPS With MITMproxy6:11
    Replacing Downloads From HTTPS5:12
    Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites6:16
    Securing Systems From The Above Post Connection Attacks5:40

Network Hacking Continued: Intermediate to Advanced

i
iSecur1ty

Instructor

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Description

Course Description

This advanced network hacking course is designed to build on your foundational knowledge. It aims to break down each attack into smaller components so you can understand how each of these components works. By the end of the course, you'll be able to mix attacks and adopt attacks to suit different situations and different scenarios, as well as know how to write your own man in the middle scripts to implement your own man in the middle attacks.

  • Access 83 lectures & 10 hours of content 24/7
  • Learn how to extend the pre-connection attacks that you already know
  • Extend the deauthentication attack to target multiple clients & multiple networks at once
  • Understand a number of advanced techniques to gain access to various network configurations & encryptions
  • Discover how to manually configure & create a fake access point
  • Create fake captive portals, steal WPA/WPA2 passwords & spy on clients
  • Cover post-connection attacks

Specs

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.