1 00:00:00,600 --> 00:00:06,400 The first penetration testing section in this course is going to be the network hacking section. 2 00:00:07,260 --> 00:00:13,760 The reason why I chose to start with this is because everything you think of it is connected to a network. 3 00:00:14,060 --> 00:00:19,980 So whether your target is a personal computer, whether it's a server, whether it's a company, 4 00:00:19,980 --> 00:00:21,780 or even if it's just a website. 5 00:00:21,940 --> 00:00:25,840 All of these systems are actually connected to a network. 6 00:00:26,420 --> 00:00:30,280 Literally, when you just connect to the Internet, you're connecting to a network 7 00:00:30,280 --> 00:00:33,040 because the Internet is just a really really big network. 8 00:00:34,020 --> 00:00:38,100 So it is very important that you understand how networks work 9 00:00:38,200 --> 00:00:43,980 and how devices communicate with each other, before we actually move into the next sections. 10 00:00:44,620 --> 00:00:49,180 So this section is actually going to be divided into three sub sections. 11 00:00:49,800 --> 00:00:57,140 In the first sub section, we're going to talk about all of the attacks that you can do before connecting to a network. 12 00:00:57,140 --> 00:01:02,760 So you literally just have a computer with a network interface, possibly a Wi-Fi adapter 13 00:01:03,920 --> 00:01:08,000 and we're going to see what can you do now before even connecting to anything. 14 00:01:08,560 --> 00:01:15,980 In the second sub section, I'm gonna show you how to crack Wi-Fi keys and gain access to Wi-Fi networks. 15 00:01:15,980 --> 00:01:20,300 Whether they use WEP, WPA or WPA2. 16 00:01:21,800 --> 00:01:27,000 Once you have the access, you can move to the third section, which will apply for both, 17 00:01:27,020 --> 00:01:29,720 Wi-Fi and wired networks. 18 00:01:30,620 --> 00:01:37,560 All of the attacks that you'll learn in the third sub section apply whenever you are able to connect to the network, 19 00:01:37,560 --> 00:01:40,660 once you're able to gain access to the network. 20 00:01:41,500 --> 00:01:47,020 And here is where the real fun starts, because you're going to learn a number of powerful attacks, 21 00:01:47,060 --> 00:01:53,280 that will allow you to intercept the connections in the network and capture everything sent in it, 22 00:01:53,280 --> 00:01:58,420 including usernames, passwords, URLs, chat messages and so on. 23 00:01:59,620 --> 00:02:05,020 Not only that, you'll also be able to modify data as it's being sent in the air. 24 00:02:05,020 --> 00:02:10,560 So you'll be able to control the requests, surf people take updates, inject evil code 25 00:02:10,900 --> 00:02:15,040 into the pages that they load and so many other cool things. 26 00:02:15,700 --> 00:02:23,360 So everything in the third section will apply for both Wi-Fi and wired networks.