MikroTik DoH against DNS spoofing attacks

Understand how DNS spoofing happens using Kali Linux and protect your network using MikroTik DNS over HTTPS feature

4.55 (21 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
MikroTik DoH against DNS spoofing attacks
153
students
2 hours
content
Jun 2020
last update
$39.99
regular price

What you will learn

Connect the MikroTik Router to the internet and share the service to LAN users

Download and install Kali Linux machine on Virtualbox

Make Kali Linux work on the same network as your PC

Upgrade Kali Linux

Change the root password

Install on Kali Linux terminator, Leafpad and Bettercap

Install Zenmap for network devices discovery

Understand how ARP works

Understand how Hackers use ARP spoofing to be a MITM

Understand how to become a MITM using Bettercap tool on Kali Linux

Understand how to configure DNS Spoofing on Kali Linux

Configure DoH on MikroTik to avoid DNS spoofing (w/o certificates)

Why take this course?

***All Hacking techniques (Arp Spoof & DNS Spoof) that are shown in this course are for educational purpose. Please use them with caution and ONLY in the LABs of this course***

Since MikroTik RouterOS version 6.47, there is a possibility to configure DNS over Https on MikroTik routers. This feature was not enabled before RouterOS v6.47

For this reason, I am designing this course to show you how you can benefit from this feature specially against the DNS spoofing attacks that may happen against your PC.

To be able to show you the importance of this feature, I am going to show you how the DNS spoof happens, which means that we will do the same techniques that a hacker use to run his DNS spoofing attacks. In other word, we are going to attack on PC from a Kali Linux machine and I am going to show you all steps that a hacker use to accomplish this mission. Once done, I will show you how to configure DoH on MikroTik router to overcome the DNS spoofing attack.

This course will be a mix of some hacking techniques to run the DNS spoofing using Kali linux machine and the solution that MikroTik providing us to use the DoH to overcome this problem, that means you will learn and be able to run a DNS spoofing attack against your PC and to use the MikroTik DoH feature to solve this problem.

For this course you require to have 1 PC and 1 MikroTik router. Also you require to have internet connectivity and 1 UTP cable.

If you want to learn the technique that hackers use to run a DNS spoofing attack and how to overcome this attack by using the DoH feature provided by MikroTik since version 6.47, then I advise you to register in this course and I will explain for you all details about those topics.

Screenshots

MikroTik DoH against DNS spoofing attacks - Screenshot_01MikroTik DoH against DNS spoofing attacks - Screenshot_02MikroTik DoH against DNS spoofing attacks - Screenshot_03MikroTik DoH against DNS spoofing attacks - Screenshot_04

Reviews

Akande
November 5, 2022
I am highly amazed to see an enterprising and highly resourceful Trainer who has simplified the course to a level that made it easy for me to learn the rudiment and application of the knowledge on a production network.
Dritan
July 1, 2020
I buy Maher courses with high expectation. DoH on MikroTik was a feature that many professionals was waiting for but for many a good understanding is necessary. In this course Maher gave the a very meaningful scenario of cause and consequence by explaining what are the security issue without applying DoH and how to overcome this. So far, Maher, have not failed short of my expectations.

Charts

Price

MikroTik DoH against DNS spoofing attacks - Price chart

Rating

MikroTik DoH against DNS spoofing attacks - Ratings chart

Enrollment distribution

MikroTik DoH against DNS spoofing attacks - Distribution chart

Related Topics

3267274
udemy ID
6/24/2020
course created date
7/24/2020
course indexed date
Bot
course submited by