ARP spoofing &Man In The Middle Attacks Execution &Detection

Learn practical attacks to test the security of clients connected to a network and how to protect against these attacks

4.35 (704 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
ARP spoofing &Man In The Middle Attacks Execution &Detection
9,294
students
5 hours
content
Mar 2024
last update
$119.99
regular price

What you will learn

21 detailed videos about practical attacks against Wi-Fi networks

Learn network basics and how devices interact with each other

Map the current network and gather info about connected clients

Learn the theory behind ARP poisoning and MITM attacks

Change the flow of packets in a network

Launch Various Man In The Middle attacks.

Gain access to any account accessed by any client in your network.

Capture all passwords entered by clients on the same netowrk

Bypass HTTPS/SSL

Redirect DNS requests (DNS Spoofing)

Capture and inject Cookies (to gain access to accounts without a password)

Create Fake Login Pages and redirect real pages to the fake one

Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc.

Detect ARP poisoning and protect your self and your network against it.

Combine individual attacks to launch even more powerful attacks.

Description

In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks.

This course is focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack, all the attacks explained in this course are launched against real devices in my lap.

The Course is Divided into four main sections:

  1. Networks Basics: in this section you will learn how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? What is MAC address and how to change it ?

  2. Information Gathering: In this section you will learn how to map the current network, ie: discover all the connected devices (clients), not only that but you will also learn how to gather important information about these clients, such as their MAC address, their IP, Operating system, open ports, programs that are using these ports and maybe even the exact version of the program.

  3. MITM Attacks: in this section you will learn a number of very powerful attacks that you can launch against the network and the connected clients, these attacks will allow you to gain access to any account accessed by any client connected to your network, read all the traffic used by these clients (images , videos , audio passwords, cookies, urls ...etc), and gain full access to any client in your network.

  4. Protection: In this section you will learn how to detect these attacks and protect yourself and your network against them.

All the attacks in this course are practical attacks that work against any device connected to our network, ie: it does not matter if the device is a phone , tablet laptop ...etc. Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED. 

Content

Preparation

Lab Overview & Needed Software
Installing Kali 2019 As a Virtual Machine
Kali Linux Overview
Linux Terminal & Basic Commands

Network Basics

Network Basics
Connecting a Wireless Adapter To Kali
What is MAC Address & How To Change It

Information Gathering

Installing Windows As a Virtual Machine
Discovering Connected Clients using netdiscover
Gathering More Information Using Zenmap
Gathering Even More Information Using Zenmap

Man In The Middle (MITM) Attacks

ARP Poisoning Theory
ARP Poisonning Using arpspoof
Bettercap Basics
ARP Poisonning Using Bettercap
Spying on Network Devices (Capturing Passwords, Visited Websites...etc)
Creating Custom Spoofing Script
Understanding HTTPS & How to Bypass it
Bypassing HTTPS
Bypassing HSTS
DNS Spoofing
Injecting Javascript Code

Packet Sniffing With Wireshark

Basic Overview & How To Use It With MITM Attacks
Sniffing & Analysing Data
Using Filters, Tracing & Dissecting Packets
Capturing Passwords & Anything Sent By Any Device In The Network

Backdooring Updates to Gain Access to Any Connected Client

Installing Veil 3.1
Creating An Undetectable Backdoor
Listening For Incoming Connections
Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10
Creating a Fake Update & Hacking Any Device In The Network

Detection

Detecting ARP Poisoning Attacks
Detecting Suspicious Activities using Wireshark

Bonus Section

Bonus Lecture - Discounts On My Full Ethical Hacking Courses

Reviews

Mihail
April 23, 2023
It is really good and understandable but maybe because it was a couple of years ago there are some differences - for example the https downgrade to http is not working
Alexander
February 16, 2023
It helped me to get a good grounding in mitma is there a second more advacned course using bettercap and what not the same tools?
ordinary
January 6, 2022
Love these courses! The highest praise I have for Zaid is simply saying he is a 'Teacher'. He explains material so it is understood. Can't ask for more.
Kevin
October 6, 2021
The course is presented in clearly, with informative materials. Good for those who like to know more in depth on ARP spoofing and MITM.
Rithea
July 8, 2021
overall 5 stars the course is great. I recommend to use kali 2020 and kali 2021 because some program version is not working but it is a good exercise to learn more and don't forget to turn off window defender and firewall. linkedin still vulnerable to these technique but other famous website has a very strong hsts hard to bypass.
Gary
June 26, 2021
Zaid's English is impeccable! Very much appreciated. Have NOT got virtual machines up Yet! But excited! s
Sunny
May 23, 2021
This course taught me lots of thing about mitm. This course is very good for everyone who is learning cyber security.
Jonatan
May 5, 2021
Some topics of the course are out dated, almost all combinations I tried to create a backdoor with Veil didn't work, all were catch by antivirus, also arp spoof isn't possible with my wifi adapter, I had to buy an Atheros one in order to be able to be the MITM, but this course really help me understand basic hacking concepts and I appreciate that, thank you very much
Francis
April 1, 2021
Nice Job!!! Zaid does like my brother, he is one of the best or the best teacher on Udemy and he has some extras out of the scope ohis courses, once you buy the courses, you get acces to his website which is even better with the extras. The extras arent free but are worthy, trust me, i've learned a lot with Zaid courses etc.
James
December 29, 2020
The instructor is very impressive. After watching him work I just want to unplug all my technology, box it up and put it to the street and move to the mountains. He is very easy to understand and follow. I have been siting on the edge of my chair hanging onto every word he is saying. Awesome course. A must for any cyber security professional.
Aakarsan
August 19, 2020
I think its good so far, but i do always get errors, but its fine cause there are always people that respond to you within 15hrs
Ryan
August 3, 2016
The Instructor uses presentation very well and gives great, precise methodologies on MITM attacks. Its a shame the course is so short.
Nelson
July 5, 2016
Since starting these courses I understand more. About my system being cracked. I feel that what I am learning will allow me to better protect my system.
Paul
September 18, 2015
Great course. Your presentation are enlightening . I have tried most of them and it works. and thanks for staying true to CLI . the best way to learn is to think not just a GUI .
Ribeiro
July 9, 2015
the course is well structured and explained, for someone trying to break into infrastructure security like me then i think its the right course

Charts

Price

ARP spoofing &Man In The Middle Attacks Execution &Detection - Price chart

Rating

ARP spoofing &Man In The Middle Attacks Execution &Detection - Ratings chart

Enrollment distribution

ARP spoofing &Man In The Middle Attacks Execution &Detection - Distribution chart
408082
udemy ID
1/29/2015
course created date
8/22/2019
course indexed date
Bot
course submited by