Code Monkey home page Code Monkey logo

arp-spoofing-and-man-in-the-middle-attacks-execution-and-detection's Introduction

ARP Spoofing and Man In The Middle Attacks: Execution and Detection [Video]

This is the code repository for ARP Spoofing and Man In The Middle Attacks: Execution and Detection Video, published by Packt. It contains all the supporting project files necessary to work through the video course from start to finish.

About the Video Course

In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks. This course focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack - all the attacks explained in this course are launched against real devices. All the attacks in this course are practical attacks that work against any device connected to your network, so it does not matter what kind of device you are targeting. Each attack is explained in a simple way first so that you understand how it actually works - first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

What You Will Learn

  • This course includes 21 detailed videos about practical attacks against Wi-Fi networks.
  • Learn network basics and how devices interact with each other; map the current network and gather info about connected clients; learn the theory behind ARP poisoning and MITM attacks.
  • Change the flow of packets in a network; launch man-in-the-middle attacks; gain access to an account accessed by any client in your network.
  • Capture all passwords entered by clients on the same network; bypass HTTPS/SSLRedirect DNS requests (DNS Spoofing);
  • Capture and inject cookies (to gain access to accounts without a password); create fake Login Pages and redirect real pages to the fake one
  • Sniff packets from clients and analyse them to extract important info such as passwords, cookies, URLs, videos, images, and so on;
  • Detect ARP poisoning and protect yourself and your network against it, and combine individual attacks to launch even more powerful attacks.

Instructions and Navigation

Assumed Knowledge

To fully benefit from the coverage included in this course, you will need:

  • Anybody who is interested in learning about network penetration testing or about how to protect networks from hackers.
  • arp-spoofing-and-man-in-the-middle-attacks-execution-and-detection's People

    Contributors

    asif-packt avatar packt-itservice avatar

    Watchers

     avatar

    Recommend Projects

    • React photo React

      A declarative, efficient, and flexible JavaScript library for building user interfaces.

    • Vue.js photo Vue.js

      ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

    • Typescript photo Typescript

      TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

    • TensorFlow photo TensorFlow

      An Open Source Machine Learning Framework for Everyone

    • Django photo Django

      The Web framework for perfectionists with deadlines.

    • D3 photo D3

      Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

    Recommend Topics

    • javascript

      JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

    • web

      Some thing interesting about web. New door for the world.

    • server

      A server is a program made to process requests and deliver data to clients.

    • Machine learning

      Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

    • Game

      Some thing interesting about game, make everyone happy.

    Recommend Org

    • Facebook photo Facebook

      We are working to build community through open source technology. NB: members must have two-factor auth.

    • Microsoft photo Microsoft

      Open source projects and samples from Microsoft.

    • Google photo Google

      Google โค๏ธ Open Source for everyone.

    • D3 photo D3

      Data-Driven Documents codes.