Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,040 --> 00:00:02,680
Hello and welcome.
2
00:00:02,780 --> 00:00:03,750
My name is zayd.
3
00:00:03,890 --> 00:00:08,750
I'm an ethical hacker a computer scientist and I'll be your instructor in this course.
4
00:00:10,270 --> 00:00:16,270
As mentioned in the course requirements you need to finish the network hacking section of my general
5
00:00:16,300 --> 00:00:22,590
ethical hacking course or finish my network hacking course before starting this course.
6
00:00:22,600 --> 00:00:27,760
This is because this course builds up on what you learn in these courses.
7
00:00:27,760 --> 00:00:34,210
So the main sections in this course have similar titles to the titles used in the other courses.
8
00:00:34,210 --> 00:00:41,110
That's because like I said it builds up on what you learn in these courses but the content in here is
9
00:00:41,110 --> 00:00:42,520
more advanced.
10
00:00:43,030 --> 00:00:49,030
So in the first section the pre-conception section we're going to be revisiting the pre-conception attacks
11
00:00:49,300 --> 00:00:54,340
and we're going to build up on what you learn to run more advanced attacks.
12
00:00:54,340 --> 00:00:59,230
So we're going to learn how to change your MAC address manually so you can change it on any device that
13
00:00:59,230 --> 00:01:02,650
supports that without relying on any tools.
14
00:01:02,770 --> 00:01:08,260
And we're going to learn how to extend the connection attacks that you know so far and run them against
15
00:01:08,260 --> 00:01:14,350
five gigahertz clients and five gigahertz networks and you're also going to learn how to extend the
16
00:01:14,620 --> 00:01:21,000
authentication attack and target multiple computers and multiple networks at the same time.
17
00:01:21,340 --> 00:01:26,980
Once done with that we're going to move to the gaining access section and the section we're going to
18
00:01:26,980 --> 00:01:34,330
talk about how to gain access to various types of networks and various types of encryptions.
19
00:01:34,330 --> 00:01:40,270
Now by now you know some basic methods to gain access to WPA and WPA too.
20
00:01:40,730 --> 00:01:46,270
But in this course before we talk about the advanced methods to do that I'm going to show you how to
21
00:01:46,270 --> 00:01:54,010
bypass some security implementations that will prevent you from even trying anything against these networks.
22
00:01:54,010 --> 00:01:59,140
So we're going to learn how to discover the names of hidden networks how to run the attacks against
23
00:01:59,140 --> 00:02:07,390
them and how to bypass MAC filtering whether it's implemented using a black list or using a whitelist.
24
00:02:07,410 --> 00:02:08,550
What's wrong with that.
25
00:02:08,580 --> 00:02:12,910
We're going to move to cracking WEP WPA and WPA too.
26
00:02:12,990 --> 00:02:19,110
But in each of these sections we're going to be capturing new more advanced attacks that will either
27
00:02:19,140 --> 00:02:26,190
allow you to get the password quicker or they'll allow you to bypass some security features implemented
28
00:02:26,190 --> 00:02:32,790
by the router or they'll enhance your attack and allow you to target even more secure networks.
29
00:02:32,790 --> 00:02:39,420
And the scores will also going to cover the Malapi and WPA to enterprise which we never spoke about
30
00:02:39,420 --> 00:02:40,180
before.
31
00:02:40,350 --> 00:02:46,500
These are similar to secure networks implemented in colleges and companies where there is an encryption
32
00:02:46,500 --> 00:02:47,030
used.
33
00:02:47,130 --> 00:02:54,330
And even when people connect to the network they have to put a username and password Not only that but
34
00:02:54,330 --> 00:02:56,470
will also cover captive portals.
35
00:02:56,490 --> 00:03:02,730
So these are similar to networks used in hotels and in airports where you went that where there is no
36
00:03:02,730 --> 00:03:03,950
encryption used.
37
00:03:03,960 --> 00:03:07,850
What was the connect you have to put a username and password in the section.
38
00:03:07,860 --> 00:03:12,330
I'm also going to show you how to manually create fake access points.
39
00:03:12,360 --> 00:03:18,060
We're going to break that down into smaller components and then combine it all together to create a
40
00:03:18,060 --> 00:03:22,510
fake access point that looks like any other normal Wi-Fi network.
41
00:03:22,850 --> 00:03:27,900
So we're going to understand exactly how fake access points work and then I'm going to show you how
42
00:03:27,900 --> 00:03:33,750
to use it to gain access to WPA and WPA to networks without running any guessing and without doing a
43
00:03:33,750 --> 00:03:35,210
brute force attack.
44
00:03:35,280 --> 00:03:40,770
You'll also learn how to use that to gain access to captive photos and you'll learn how to use it with
45
00:03:40,800 --> 00:03:45,750
any other scenario that you think of once done with this we're going to move to the post connection
46
00:03:45,810 --> 00:03:52,670
attack section and the section you're going to learn a number of attacks that you can do after connect
47
00:03:52,700 --> 00:03:53,810
to the network.
48
00:03:53,810 --> 00:03:59,690
So all of the attacks that are going to learn here will work against both wife and wired networks.
49
00:03:59,720 --> 00:04:04,690
And here you're going to learn how to become the man in the middle using HRP spoofing how to bypass
50
00:04:04,730 --> 00:04:11,740
histed CPS and sniff sensitive data how to do it and as spoofing all of which you already know what
51
00:04:11,750 --> 00:04:17,330
you're going to learn how to do this manually without relying on scripts like mine in the middle.
52
00:04:17,430 --> 00:04:22,970
So you're going to understand how each of these components work and you'll be able to adapt this to
53
00:04:23,060 --> 00:04:28,100
a number of scenarios regardless of how you become the man in the middle whether you became the man
54
00:04:28,100 --> 00:04:35,750
in the middle using an air piece spoofing attack or using fake access point or using any other method.
55
00:04:36,350 --> 00:04:44,860
Not only that but I'm also going to show you how to properly analyze the flows that flow in your network.
56
00:04:45,020 --> 00:04:51,710
And I'm going to show you how to start creating your own attacks and write scripts to automatically
57
00:04:51,710 --> 00:04:55,440
execute your own ideas and your own attacks.
58
00:04:55,880 --> 00:05:01,250
So by the end of the section if you just have an idea of an attack and there is no tool at all that
59
00:05:01,250 --> 00:05:08,120
does that attack you're going to know how to first of all analyze how the traffic flows and then think
60
00:05:08,240 --> 00:05:10,240
of how you're going to implement this attack.
61
00:05:10,310 --> 00:05:16,310
And you're also going to have the skills to literally write a script that will execute this attack for
62
00:05:16,310 --> 00:05:18,700
you at the end of each of the sections.
63
00:05:18,770 --> 00:05:24,170
We're going to talk about the security aspect and how to secure yourself and your systems from these
64
00:05:24,170 --> 00:05:24,680
attacks.
7489
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.