Udemy - Network Hacking Continued – Intermediate to Advanced [Des...

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.5 GB
  • Uploaded By CourseClub
  • Downloads 1334
  • Last checked 1 month ago
  • Date uploaded 6 years ago
  • Seeders 14
  • Leechers 3

Infohash : F1D036A0B55D725AD2CFD4AF6EDF5179538300CE



Network Hacking Continued – Intermediate to Advanced

Learn advanced techniques to hack into WiFi & wired networks & write own python scripts to implement custom MITM attacks

For More Courses Visit: https://desirecourse.net

Files:

[DesireCourse.Net] Udemy - Network Hacking Continued - Intermediate to Advanced 1. Introduction
  • 1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.mp4 (22.0 MB)
  • 1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.vtt (7.9 KB)
  • 2. Course Overview.mp4 (21.0 MB)
  • 2. Course Overview.vtt (6.5 KB)
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks
  • 1. MITMproxy - What is It & How To Install It.mp4 (7.8 MB)
  • 1. MITMproxy - What is It & How To Install It.vtt (4.5 KB)
  • 1.1 MITMproxy Download Page.html (0.1 KB)
  • 1.1 Post Connection - Analysing Data Flows.pdf.pdf (190.0 KB)
  • 1.2 MITMproxy Download Page.html (0.1 KB)
  • 1.2 Post Connection - Analysing Data Flows.pdf.pdf (190.0 KB)
  • 10. [Bonus] - Hacking Windows 10 Using A Fake Update.mp4 (11.6 MB)
  • 10. [Bonus] - Hacking Windows 10 Using A Fake Update.vtt (5.4 KB)
  • 2. Using MITMproxy In Explicit Mode.mp4 (11.4 MB)
  • 2. Using MITMproxy In Explicit Mode.vtt (7.4 KB)
  • 3. Analysing (Filtering & Highlighting) Flows.mp4 (11.8 MB)
  • 3. Analysing (Filtering & Highlighting) Flows.vtt (5.9 KB)
  • 4. Intercepting Network Flows.mp4 (9.9 MB)
  • 4. Intercepting Network Flows.vtt (5.5 KB)
  • 5. Modifying Responses & Injecting Javascript Manually.mp4 (22.9 MB)
  • 5. Modifying Responses & Injecting Javascript Manually.vtt (9.6 KB)
  • 6. Intercepting & Modifying Responses In Transparent Mode.mp4 (16.2 MB)
  • 6. Intercepting & Modifying Responses In Transparent Mode.vtt (8.7 KB)
  • 7. Editing Responses & Injecting BeEF's Code On The Fly.mp4 (23.0 MB)
  • 7. Editing Responses & Injecting BeEF's Code On The Fly.vtt (10.0 KB)
  • 8. Editing Responses Automatically Based On Regex.mp4 (20.4 MB)
  • 8. Editing Responses Automatically Based On Regex.vtt (9.6 KB)
  • 9. [Bonus] - Stealing Login Info Using Fake Login Prompt.mp4 (19.1 MB)
  • 9. [Bonus] - Stealing Login Info Using Fake Login Prompt.vtt (8.5 KB)
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks
  • 1. What Do Mean By MITM Scripts.mp4 (13.7 MB)
  • 1. What Do Mean By MITM Scripts.vtt (6.7 KB)
  • 1.1 Post Connection - Writing Custom Scripts.pdf.pdf (211.3 KB)
  • 1.2 MITMproxy Scripting Wiki Page.html (0.1 KB)
  • 10. Executing Bash Commands & Calling Trojan Factory From Our Script.mp4 (18.7 MB)
  • 10. Executing Bash Commands & Calling Trojan Factory From Our Script.vtt (9.2 KB)
  • 11. Using Variables & More Complex Conditions.mp4 (17.0 MB)
  • 11. Using Variables & More Complex Conditions.vtt (9.5 KB)
  • 12. Converting Downloads To Trojans On The Fly.mp4 (23.2 MB)
  • 12. Converting Downloads To Trojans On The Fly.vtt (11.4 KB)
  • 12.1 basic-v3.py.py (0.5 KB)
  • 13. Configuring The Trojan Factory's MITMproxy Script.mp4 (16.4 MB)
  • 13. Configuring The Trojan Factory's MITMproxy Script.vtt (8.3 KB)
  • 14. Using The Trojan Factory MITMproxy Script.mp4 (18.8 MB)
  • 14. Using The Trojan Factory MITMproxy Script.vtt (9.0 KB)
  • 2. Capturing & Printing RequestsResponses.mp4 (18.2 MB)
  • 2. Capturing & Printing RequestsResponses.vtt (9.4 KB)
  • 2.1 basic.py.py (0.1 KB)
  • 3. Filtering Flows & Extracting Useful Data.mp4 (27.4 MB)
  • 3. Filtering Flows & Extracting Useful Data.vtt (10.6 KB)
  • 4. Using Conditions To Execute Code On Useful Flows.mp4 (26.8 MB)
  • 4. Using Conditions To Execute Code On Useful Flows.vtt (10.3 KB)
  • 5. Generating Custom HTTP Responses.mp4 (19.3 MB)
  • 5. Generating Custom HTTP Responses.vtt (9.3 KB)
  • 6. Testing Script Locally.mp4 (18.3 MB)
  • 6. Testing Script Locally.vtt (8.9 KB)
  • 6.1 basic-v2.py.py (0.3 KB)
  • 7. Generating Trojans - Installing The Trojan Factory.mp4 (15.9 MB)
  • 7. Generating Trojans - Installing The Trojan Factory.vtt (7.3 KB)
  • 7.1 Trojan Factory Git Repo.html (0.1 KB)
  • 8. Generating Trojans - Converting Any File (egimage) To a Trojan.mp4 (24.3 MB)
  • 8. Generating Trojans - Converting Any File (egimage) To a Trojan.vtt (11.2 KB)
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites
  • 1. Bypassing HTTPS With MITMproxy.mp4 (16.3 MB)
  • 1. Bypassing HTTPS With MITMproxy.vtt (7.2 KB)
  • 1.1 MITMProxy Complex Scripts.html (0.1 KB)
  • 1.2 sslstrip.py.py (2.4 KB)
  • 2. Replacing Downloads From HTTPS.mp4 (12.7 MB)
  • 2. Replacing Downloads From HTTPS.vtt (5.6 KB)
  • 3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.mp4 (13.9 MB)
  • 3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.vtt (7.1 KB)
  • 4. Securing Systems From The Above Post Connection Attacks.mp4 (20.5 MB)
  • 4. Securing Systems From The Above Post Connection Attacks.vtt (5.8 KB)
13. Bonus Section
  • 1. Bonus Lecture - What's Next.html (6.1 KB)
2. Back To BasicsPre-Connection Attacks
  • 1. Pre-connection Attacks Overview.mp4 (7.2 MB)
  • 1. Pre-connection Attacks Overview.vtt (2.5 KB)
  • 1.1 Pre-Connection Attacks.pdf.pdf (125.6 KB)
  • 2. Spoofing Mac Address Manually.mp4 (6.2 MB)
  • 2. Spoofing Mac Address Manually.vtt (4.4 KB)
  • 3. Targeting 5 GHz Networks.mp4 (13.0 MB)
  • 3. Targeting 5 GHz Networks.vtt (7.6 KB)
  • 3.1 Best Wireless Adapters For Hacking.html (0.1 KB)
  • 3.1 website Selling Supported Wireless Adapters.html (0.1 KB)
  • 3.2 Best Wireless Adapters For Hacking.html (0.1 KB)
  • 3.2 website Selling Supported Wireless Adapters.html (0.1 KB)
  • 4. Deauthenticating a Client From Protected WiFi Networks.mp4 (16.3 MB)
  • 4. Deauthenticating a Client From Protected WiFi Networks.vtt (8.5 KB)
  • 5. Deauthenticating Multiple Clients From Protected WiFi Networks.mp4 (17.3 MB)
  • 5. Deauthenticating Multiple Clients From Protected WiFi Networks.vtt (17.3 MB)
  • 6. Deauthenticating All Clients From Protected WiFi Network.mp4 (13.6 MB)
  • 6. Deauthenticating All Clients From Protected WiFi Network.vtt (6.9 KB)
3. Gaining Access
  • 1. Gaining Access Overview.mp4 (15.6 MB)
  • 1. Gaining Access Overview.vtt (2.9 KB)
  • 1.1 Gaining Access.pdf.pdf (166.3 KB)
  • 2. Discovering Names of Hidden Networks.mp4 (16.3 MB)
  • 2. Discovering Names of Hidden Networks.vtt (10.5 KB)
  • 3. Connecting To Hidden Networks.mp4 (12.3 MB)
  • 3. Connecting To Hidden Networks.vtt (6.0 KB)
  • 4. Bypassing Mac Filtering (Blacklists & Whitelists).mp4 (20.2 MB)
  • 4. Bypassing Mac Filtering (Blacklists & Whitelists).vtt (10.8 KB)
  • 5. Cracking SKA WEP Networks.mp4 (18.2 MB)
  • 5. Cracking SKA WEP Networks.vtt (10.4 KB)
  • 6. Securing Systems From The Above Attacks.mp4 (21.3 MB)
  • 6. Securing Systems From The Above Attacks.vtt (3.8 KB)
  • 6.1 More info about IEEE 802.11w.html (0.1 KB)
  • 6.1 Security 1.pdf.pdf (107.8 KB)
  • 6.2 More info about IEEE 802.11w.html (0.1 KB)
  • 6.2 Security 1.pdf.pdf (107.8 KB)
4. Gaining Access - Captive Portals
  • 1. Sniffing Captive Portal Login Information In Monitor Mode.mp4 (24.7 MB)
  • 1. Sniffing Captive Portal Login Information In Monitor Mode.vtt (11.6 KB)
  • 1.1 Gaining Access - Captive Portals.pdf.pdf (200.7 KB)
  • 10. Redirecting Requests To Captive Portal Login Page.mp4 (29.0 MB)
  • 10. Redirecting Requests To Captive Portal Login Page.vtt (12.8 KB)
  • 10.1 rewrite-rules.txt.txt (0.2 KB)
  • 11. Generating Fake SSL Certificate.mp4 (10.8 MB)
  • 11. Generating Fake SSL Certificate.vtt (5.7 KB)
  • 12. Enabling SSLHTTPS On Webserver.mp4 (16.2 MB)
  • 12. Enabling SSLHTTPS On Webserver.vtt (8.0 KB)
  • 13. Sniffing & Analysing Login Credentials.mp4 (14.6 MB)
  • 13. Sniffing & Analysing Login Credentials.vtt (6.4 KB)
  • 2. Sniffing Captive Portal Login Information Using ARP Spoofing.mp4 (18.2 MB)
  • 2. Sniffing Captive Portal Login Information Using ARP Spoofing.vtt (11.0 KB)
  • 3. Creating a Fake Captive Portal - Introduction.mp4 (10.8 MB)
  • 3. Creating a Fake Captive Portal - Introduction.vtt (5.3 KB)
  • 4. Creating Login Page - Cloning a Login Page.mp4 (17.4 MB)
  • 4. Creating Login Page - Cloning a Login Page.vtt (7.8 KB)
  • 5. Creating Login Page - Fixing Relative Links.mp4 (15.4 MB)
  • 5. Creating Login Page - Fixing Relative Links.vtt (8.0 KB)
  • 6. Creating Login Page - Adding Form Tag.mp4 (18.2 MB)
  • 6. Creating Login Page - Adding Form Tag.vtt (9.1 KB)
  • 7. Creating Login Page - Adding Submit Button.mp4 (17.3 MB)
  • 7. Creating Login Page - Adding Submit Button.vtt (7.4 KB)
  • 8. Preparing Computer To Run Fake Captive Portal.mp4 (20.1 MB)
  • 8. Preparing Computer To Run Fake Captive Portal.vtt (9.2 KB)
  • 8.1 flushiptables.sh.sh (0.2 KB)
  • 9. Starting The Fake Captive Portal.mp4 (29.1 MB)
  • 9. Starting The Fake Captive Portal.vtt (13.3 KB)
  • 9.1 dnsmasq.conf.conf (0.3 KB)
  • 9.2 hostapd.conf.conf (0.1 KB)
5. Gaining Access - WPAWPA2 Cracking - Exploiting WPS
  • 1. Exploiting WPS - Introduction.mp4 (9.7 MB)
  • 1. Exploiting WPS - Introduction.vtt (1.9 KB)
  • 2. Bypassing Failed to associate Issue.mp4 (15.0 MB)
  • 2. Bypassing Failed to associate Issue.vtt (8.3 KB)
  • 3. Bypassing 0x3 and 0x4 Errors.mp4 (19.4 MB)
  • 3. Bypassing 0x3 and 0x4 Errors.vtt (8.6 KB)
  • 4. WPS Lock - What Is It & How To Bypass It.mp4 (26.3 MB)
  • 4. WPS Lock - What Is It & How To Bypass It.vtt (8.4 KB)
  • 5. Unlocking WPS.mp4 (20.2 MB)
  • 5. Unlocking WPS.vtt (9.9 KB)
6. Gaining Access - WPAWPA2 Cracking - Advanced Wordlist Attack
  • 1. Advanced Wordlist Attacks - Introduction.mp4 (10.1 MB)
  • 1. Advanced Wordlist Attacks - Introduction.vtt (2.0 KB)
  • 1.1 Gaining Access - Advanced Wordlist Attacks.pdf.pdf (157.6 KB)
  • 1.1 Some-Links-To-Wordlists.txt.txt (0.4 KB)
  • 1.2 Gaining Access - Advanced Wordlist Attacks.pdf.pdf (157.6 KB)
  • 1.2 Some-Links-To-Wordlists.txt.txt (0.4 KB)
  • 2. Saving Aircrack-ng Cracking Progress.mp4 (20.7 MB)
  • 2. Saving Aircrack-ng Cracking Progress.vtt (10.6 KB)
  • 3. Using Huge Wordlists With Aircrack-ng Without Wasting Storage.mp4 (20.1 MB)
  • 3. Using Huge Wordlists With Aircrack-ng Without Wasting Storage.vtt (8.2 KB)
  • 4. Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage.mp4 (25.4 MB)
  • 4. Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage.vtt (11.2 KB)
  • 5. Cracking WPAWPA2 Much Faster Using GPU - Part 1.mp4 (16.9 MB)
  • 5. Cracking WPAWPA2 Much Faster Using GPU - Part 1.vtt (8.2 KB)
  • 5.1 HashCat Download Page.html (0.1 KB)
  • 5.2 Cap2hccapx.html (0.1 KB)
  • 6. Cracking WPAWPA2 Much Faster Using GPU - Part 2.mp4 (34.0 MB)
  • 6. Cracking WPAWPA2 Much Faster Using GPU - Part 2.vtt (11.3 KB)
7. Gaining Access - WPAWPA Cracking - Evil Twin Attack
  • 1. What is It & How it Works.mp4 (18.0 MB)
  • 1. What is It & How it Works.vtt (8.8 KB)
  • 1.1 Gaining Access - Evil Twin.pdf.pdf (120.1 KB)
  • 2. Installing Needed Software.mp4 (19.6 MB)
  • 2. Installing Needed Software.vtt (8.6 KB)
  • 2.1 Fluxion Git Repo.html (0.1 KB)
  • 3. Stealing WPAWPA2 Key Using Evil Twin Attack Without Guessing.mp4 (24.8 MB)
  • 3. Stealing WPAWPA2 Key Using Evil Twin Attack Without Guessing.vtt (10.8 KB)
  • 4. Debugging & Fixing Login Interface.mp4 (29.1 MB)
  • 4. Debugging & Fixing Login Interface.vtt (14.0 KB)
8. Gaining Access - WPAWPA2 Cracking - WPAWPA2 Enterprise
  • 1. What is WPAWPA2 Enterprise & How it Works.mp4 (13.6 MB)
  • 1. What is WPAWPA2 Enterprise & How it Works.vtt (6.1 KB)
  • 1.1 Gaining Access - WPA%2FWPA2 Enterprise.pdf.pdf (246.6 KB)
  • 2. How To Hack WPAWPA2 Enterprise.mp4 (18.9 MB)
  • 2. How To Hack WPAWPA2 Enterprise.vtt (7.8 KB)
  • 3. Stealing Login Credentials.mp4 (16.7 MB)
  • 3. Stealing Login Credentials.vtt (8.9 KB)
  • 4. Cracking Login Credentials.mp4 (15.5 MB)
  • 4. Cracking Login Credentials.vtt (7.1 KB)
  • 5. Securing Systems From The Above Gaining Access Attacks.mp4 (34.5 MB)
  • 5. Securing Systems From The Above Gaining Access Attacks.vtt (5.8 KB)
  • 5.1 Security 2.pdf.pdf (112.9 KB)
9. Post Connection Attacks
  • 1. Post Connection Attacks Overview.mp4 (28.0 MB)
  • 1. Post Connection Attacks Overview.vtt (5.3 KB)
  • 1.1 Post Connection.pdf.pdf (279.6 KB)
  • 2. Ettercap - Basic Overview.mp4 (16.4 MB)
  • 2. Ettercap - Basic Overview.vtt (8.5 KB)
  • 3. Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords.mp4 (22.8 MB)
  • 3. Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords.vtt (10.8 KB)
  • 4. Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites.mp4 (27.1 MB)
  • 4. Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites.vtt (13.8 KB)
  • 5. Automatically ARP Poisoning New Clients.mp4 (15.8 MB)
  • 5. Automatically ARP Poisoning New Clients.vtt (7.6 KB)
  • 6. DNS Spoofing Using Ettercap.mp4 (11.3 MB)
  • 6. DNS Spoofing Using Ettercap.vtt (5.9 KB)
  • 7. Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms.mp4 (23.3 MB)
  • 7. Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms.vtt (10.0 KB)
  • [CourseClub.Me].url (0.0 KB)
  • [DesireCourse.Net].url (0.0 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • http://0d.kebhana.mx:443/announce
  • udp://tw.opentracker.ga:36920/announce
  • udp://temp1.opentracker.gq:6969/announce
  • udp://temp2.opentracker.gq:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • http://torrent.nwps.ws:80/announce
  • udp://explodie.org:6969/announce
  • https://opentracker.xyz:443/announce
  • https://t.quic.ws:443/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://tracker.zer0day.to:1337/announce
  • udp://eddie4.nl:6969/announce
  • udp://open.demonii.si:1337/announce
R2-CACHE ☁️ R2 (hit) | CDN: MISS (0s) 📄 torrent 🕐 09 Jan 2026, 04:45:28 am IST ⏰ 03 Feb 2026, 04:45:25 am IST ✅ Valid for 17d 14h 🔄 Refresh Cache