Learning Outcome:
Requirement:
Course Curriculum
Prepration
Available in
days
days
after you enroll
Network Basics
Available in
days
days
after you enroll
Man in the Middle Attacks
Available in
days
days
after you enroll
-
Start
Introduction
(1:12)
-
Start
Gathering information about the connected clients
(2:59)
-
Start
Gather detailed information about the connected clients
(7:10)
-
Start
Man in the middle attack explain
(3:40)
-
Preview
MITM attack using (arpspoof)
(7:24)
-
Start
Capturing login credentials
(5:23)
-
Start
Bypassing SSL certificate
(6:38)
-
Start
Redirect any client from to any website
(6:32)
-
Preview
Stealing the Cookies
(7:02)
-
Preview
Capture a screenshot from the target browser
(4:12)
-
Start
Injecting a keylogger into the webpage
(4:49)
-
Start
Capturing images from the network traffic
(3:35)
-
Start
Injecting html file and flip the images in the target browser
(6:48)
-
Start
Injecting JavaScript URL and Hooking the client’s with BeEF
(6:58)
-
Start
Stealing the target accounts with BeEF
(3:45)
-
Start
Having fun with BeEF
(8:49)
Prepration
Available in
days
days
after you enroll
Network Basics
Available in
days
days
after you enroll
Man in the Middle Attacks
Available in
days
days
after you enroll
-
StartIntroduction (1:12)
-
StartGathering information about the connected clients (2:59)
-
StartGather detailed information about the connected clients (7:10)
-
StartMan in the middle attack explain (3:40)
-
PreviewMITM attack using (arpspoof) (7:24)
-
StartCapturing login credentials (5:23)
-
StartBypassing SSL certificate (6:38)
-
StartRedirect any client from to any website (6:32)
-
PreviewStealing the Cookies (7:02)
-
PreviewCapture a screenshot from the target browser (4:12)
-
StartInjecting a keylogger into the webpage (4:49)
-
StartCapturing images from the network traffic (3:35)
-
StartInjecting html file and flip the images in the target browser (6:48)
-
StartInjecting JavaScript URL and Hooking the client’s with BeEF (6:58)
-
StartStealing the target accounts with BeEF (3:45)
-
StartHaving fun with BeEF (8:49)
Your Instructor
Saad Sarraj
My Name is Saad Sarraj , i am a young Ethical Hacker who is trying to keep the things secure.I have a very good Experience in penetration testing and Ethical Hacking, i started in this field since 2012 , then i have created my own website (iSecurityPro) and started making videos on my YouTube channel which includes many tips and tricks about Linux OS and Windows OS , i am always focusing on the practical side in producing videos and also the theory behind every single attack, and i am trying to share my experience with you from what i learned before .
Reviews








Course Curriculum
Prepration
Available in
days
days
after you enroll
Network Basics
Available in
days
days
after you enroll
Man in the Middle Attacks
Available in
days
days
after you enroll
-
StartIntroduction (1:12)
-
StartGathering information about the connected clients (2:59)
-
StartGather detailed information about the connected clients (7:10)
-
StartMan in the middle attack explain (3:40)
-
PreviewMITM attack using (arpspoof) (7:24)
-
StartCapturing login credentials (5:23)
-
StartBypassing SSL certificate (6:38)
-
StartRedirect any client from to any website (6:32)
-
PreviewStealing the Cookies (7:02)
-
PreviewCapture a screenshot from the target browser (4:12)
-
StartInjecting a keylogger into the webpage (4:49)
-
StartCapturing images from the network traffic (3:35)
-
StartInjecting html file and flip the images in the target browser (6:48)
-
StartInjecting JavaScript URL and Hooking the client’s with BeEF (6:58)
-
StartStealing the target accounts with BeEF (3:45)
-
StartHaving fun with BeEF (8:49)