Video description
The comprehensive course to perform MITM attacks against connected devices and protect them from all these attacks.
About This Video
- Learn to set up Kali Linux in various environments
- Learn how to perform Man in the Middle attacks
- Understand how to hack the connected clients
In Detail
In this course, you will learn how to set up your Kali Linux 2.0 lab environment properly. In addition to that, you will learn how devices communicate with each other. Lastly, you will learn the best out of this course, which is the Man in the Middle attacks.
This course is divided into the following four sections:
- Preparation: In this section, you will learn how to download and set up the latest version of Kali Linux as a virtual machine or as your main OS. This helps you create your own safe hacking lab environment.
- Network basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing.
- MITM attack: In this section, you will learn how to perform man-in-the-middle attacks and what post-modules can be carried out on the target OS. Modules such as playing music on the target OS, stealing credentials, and many more. You will even learn how to gain full access to the connected devices.
- Protecting yourself against these attacks: After learning MITM attacks, it is time to learn how to protect your OS against all the previously mentioned attacks.
By the end of the course, you will be able to perform MITM attacks on the target network and fully control all the connected computers. You will be able to protect yourself from MITM attacks.
Audience
This course is for people who want to do penetration testing against their devices; for people who want to secure their devices against these attacks; and for people who want to protect themselves and their accounts against all these attacks.
Table of Contents
Chapter 1 : Introduction
Introduction
Chapter 2 : Preparation
Set Up Kali Linux as Your Main OS
Set Up Kali as a Virtual Machine (VirtualBox)
Set Up Kali Linux as a Virtual Machine (VMware)
Configure NAT Network in VirtualBox
Enhance Your Virtual Machine Performance
Taking Snapshots of Virtual Machines
Set Up Windows as a Virtual Machine
Updating Kali Linux
Chapter 3 : The Basics of Networks
Network Basic
Spoofing Your MAC Address
Chapter 4 : Performing Man in the Middle Attacks
Introduction
Man in the Middle Attack Explained
Gathering Information about the Connected Clients
Gather Detailed Information about the Clients
MITM Attack Using (ARPspoof)
Capturing Login Credentials
Bypassing SSL Certificate
Redirect Any Client to Any Website
Stealing the Cookies
Capture a Screenshot from the Target Browser
Injecting a Keylogger into the Target Webpage
Capturing Images from Network Traffic
Injecting HTML File and Flipping the Images in the Target Browser
Injecting JavaScript URL and Hooking the Clients with BeEF
Stealing the Target Accounts with BeEF
Having Fun with BeEF
Chapter 5 : Hacking Connected Clients
Creating an Encrypted Backdoor
Testing the Backdoor in the Target Device
Creating a Fake Browser Update and Hacking Any Client
Interacting with the Target Computer (Part 1)
Interacting with the Target Computer (Part 2)
Chapter 6 : Detection and Security
Detect ARP Poisoning Attack Using (XARP)
Detect ARP Poisoning Attack (Wireshark)
Prevent Your ARP Table from Poisoning
Detect and Kill Any Meterpreter Session