Sun, 13 Feb|
Network Hacking Bootcamp
Learn how to hack like black hat hackers and secure systems like a security expert
Time & Location
13 Feb 2022, 11:00 am – 1:00 pm GMT+4
About the event
Welcome to the comprehensive Ethical Network Hacking Bootcamp! Here you will learn how to hack computer systems like black hat hackers and secure them like security experts from scratch.
This is a highly practical course that also ensures that no theory is neglected. Starting from the basics of ethical hacking and installing the needed software, we will dive straight into hacking. There will be live examples for everything that will be taught, so we will be analysing and exploiting real systems.
The BootCamp is focused on Network hacking in which you will learn how networks work, their vulnerabilities, how to exploit its weaknesses to gain access to the network and perform post connection attacks like intercepting connections to see what other people are doing on the internet.
1. Network Hacking- in this section you will learn how to gain access to wired and wireless networks. Get to know the basics of how networks work and how devices communicate with each other in a network. This is section is further splits into three sections.
Pre-connection attacks: Learn the attacks that can be executed without being connected to the target network, gather information about networks around you, discover connected devices and control connections.
Gaining access: Learn to crack the key and get the password no matter what its encryption(WPA, WPA2, WEP)
Post connection attacks: After gaining access to the target network, we can now gather more information on the target websites, see their activity on the internet(login details, passwords, search history, videos, images, etc.), redirect requests, inject code in loaded pages to show the user what you want them to see. You will also be able to create a fake WiFi network, pull users to connect to it, and use all of the attacks learned against them.
All the attacks kept aside, one important aspect of this course is to prevent these attacks from being used against you so I will be teaching you ways to detect and secure your system against other potential hackers.
Important notice- the course is for educational purposes only and all the attacks performed were in my own network and on devices I had permission to use. It is important that you do the same for your own safety and not use any skill learned as an intention to harm.
-No prior knowledge in programming, Linux or hacking is required
-Computer with a minimum of 4GB RAM
-Operating System- Windows/ Mac OS/ Linux
-Wireless adapter that supports monitor mode
Link for wireless adapters that support monitor mode