1. Introduction/1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.mp421.98MB
1. Introduction/2. Course Overview.mp421.05MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1. Introduction to MITMproxy.mp47.78MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/10. [Bonus] - Hacking Windows 10 Using A Fake Update.mp411.63MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/2. Using MITMproxy In Explicit Mode.mp411.41MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/3. Analysing (Filtering & Highlighting) Flows.mp411.76MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/4. Intercepting Network Flows.mp49.93MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/5. Modifying Responses & Injecting Javascript Manually.mp422.95MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/6. Intercepting & Modifying Responses In Transparent Mode.mp416.21MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/7. Editing Responses & Injecting BeEF's Code On The Fly.mp422.97MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/8. Editing Responses Automatically Based On Regex.mp420.41MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/9. [Bonus] - Stealing Login Info Using Fake Login Prompt.mp419.1MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1. Introduction to MITM Scripts.mp413.75MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/10. Executing Bash Commands & Calling Trojan Factory From Our Script.mp418.72MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/11. Using Variables & More Complex Conditions.mp416.95MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12. Converting Downloads To Trojans On The Fly.mp423.17MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/13. Configuring The Trojan Factory's MITMproxy Script.mp416.45MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/14. Using The Trojan Factory MITMproxy Script.mp418.81MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2. Capturing & Printing RequestsResponses.mp418.17MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/3. Filtering Flows & Extracting Useful Data.mp427.38MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/4. Using Conditions To Execute Code On Useful Flows.mp426.84MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/5. Generating Custom HTTP Responses.mp419.33MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6. Testing Script Locally.mp418.28MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7. Generating Trojans - Installing The Trojan Factory.mp415.88MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/8. Generating Trojans - Converting Any File (egimage) To a Trojan.mp424.26MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.mp414.92MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1. Bypassing HTTPS With MITMproxy.mp416.32MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/2. Replacing HTTPS Downloads.mp412.69MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.mp413.9MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/4. Securing Systems From The Above Post Connection Attacks.mp420.51MB
2. Back To BasicsPre-Connection Attacks/1. Pre-connection Attacks Overview.mp47.21MB
2. Back To BasicsPre-Connection Attacks/2. Spoofing Mac Address Manually.mp46.24MB
2. Back To BasicsPre-Connection Attacks/3. Targeting 5 GHz Networks.mp412.97MB
2. Back To BasicsPre-Connection Attacks/4. Deauthenticating a Client From Protected WiFi Networks.mp416.28MB
2. Back To BasicsPre-Connection Attacks/5. Deauthenticating Multiple Clients From Protected WiFi Networks.mp417.26MB
2. Back To BasicsPre-Connection Attacks/6. Deauthenticating All Clients From Protected WiFi Network.mp413.58MB