English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 47 lectures (6h 59m) | 4.40 GB
Master network hacking: Learn exploit dev, build custom tools, and use pre-made tools to level up your security skills!
In this Network Hacking course, you’ll dive deep into both the theory and hands-on techniques used by ethical hackers to secure and exploit network infrastructures. We’ll start with the fundamentals, covering essential networking concepts and protocols, before moving into advanced topics like attacking key network components—DNS, DHCP, routers, and more. You’ll learn how to execute powerful attacks such as Denial of Service (DoS), MAC spoofing, and exploiting applications over the network.
A unique feature of this course is its focus on coding your own hacking tools using Python, giving you the skills to automate attacks and craft custom solutions. We’ll also explore network security and protection strategies, including how to defend against ARP spoofing, write custom IDS/IPS rules, and secure routers to prevent unauthorized access. Whether you’re a beginner or looking to expand your expertise, this course offers a hands-on, in-depth approach to mastering network hacking and securing networks against common threats.
Here is Overview of the topics that we will cover:
- Introduction To The Course
- Denial of Service Attack
- Bypassing Routers Whitelist/Blacklist
- Man In The Middle Attack (MITM)
- DNS Attacks
- Vulnerabilities In Protocols/Network Components
- DHCP Attacks
- Router Hacking
- Weak Cryptography
- Project: Manually Exploiting Application Over The Network
- Protecting The Network
- Bonus Section: Learn Networking Basics
What you’ll learn
- Common Network Vulnerabilities
- Coding Python Hacking Tools To Test Network Security
- Using Kali Linux Tools to perform Network Penetration Testing
- Writing exploit from scratch for a Vulnerable Network Application
- Using gdb debugger to reverse Engineer an application
- Writing IDS/IPS rules for Network Traffic
- Learning about DNS Vulnerabilities
- Learning about common Router Vulnerabilities
- Learning about DHCP Attacks
- Showing Large Zero Day Vulnerability In Recent IPv6 Protocol
- Using Virtual Machines To Demonstrate Attacks
- Learning About Networking In General
- Learning How To Protect Against Common Network Attacks
- Many more things …
Table of Contents
Introduction
1 Welcome To The Course!
2 How To Follow This Course
3 Note 1
4 Note 2
Denial Of Service Attack
5 DDoS Attacks Theory
6 Denial of Service In Practice
Bypassing Routers WhitelistBlacklist
7 MAC address Spoofing Theory
8 Bypassing Blacklist with spoof-mac
Man In The Middle Attack (MITM)
9 MITM Explained
10 Arp Spoofing In Practice
11 Stealing Credentials with MITM Attack
DNS Attacks
12 Existing DNS Attacks Explained
13 DNS Spoofing Example
14 Establishing Reverse Shell Through DNS Tunneling
Vulnerabilities In ProtocolsNetwork Components
15 Zero Day Vulnerabilities In Protocols Explained
16 Exploiting IPv6 Vulnerability
DHCP Attacks
17 DHCP Attacks Theory
18 DHCP Starvation
19 Rogue DHCP
Router Hacking
20 Common Router Vulnerabilities
21 Hacking Router With Various Methods
Weak Cryptography
22 Vulnerable Encryption Protocols
23 Exploiting Vulnerable Encryption
Manually Exploiting Application Over The Network
24 Project Exploiting Application Over The Network To Gain Reverse Shell
25 Writing Exploit Part 1
26 Writing Exploit Part 2
27 Writing Exploit Part 3
Protecting The Network
28 How To Protect Your Network
29 ARP Spoof IDSIPS
30 Writing IDSIPS Rules with Snort
31 Router Security Settings
32 Wireshark
Bonus Section Learn Networking Basics
33 What is Networking
34 OSI Model
35 Encapsulation & Decapsulation
36 IPv4 Explained
37 IPv6 Explained
38 IPv4 vs IPv6
39 Subnetting
40 IP Protocol Types
41 What are Ports
42 HTTP, HTTPS
43 DHCP
44 DNS
45 Networking Devices
46 MAC address
47 ARP
Resolve the captcha to access the links!