⏰ Duration: 20 Days | 🗓 Starting: 27th May (Tuesday) | 🕕 Time: 6 PM - 7 PM IST
Module 1: Introduction to Networking
- What is Networking?
- Types of Networks
- OSI Model
- IP Addressing [Wireshark]
- MAC vs IP [ipconfig, ifconfig]
Module 2: Packet Analysis
- What is Packet Sniffing
- Packet Structure
- Live Packet Capture [Wireshark]
- Analyzing Protocols
- MITM Overview [Ettercap]
Module 3: Scanning & Enumeration
- Port Scanning
- Banner Grabbing
- OS Detection
- Service Enumeration [Nmap]
- SNMP/SMB Enum [enum4linux]
Module 4: ARP Poisoning
- ARP Protocol Basics
- How ARP Spoofing Works
- ARP Poisoning Demo
- Packet Injection [Bettercap]
- Detect ARP Attacks
Module 5: DNS Spoofing
- What is DNS & How It Works
- DNS Spoofing Attacks
- Redirection with DNS
- Tool-based Demo [dsniff]
- Defense Techniques
Module 6: DHCP Attacks
- What is DHCP?
- DHCP Starvation Attack
- Rogue DHCP Server Setup
- Tool Use [Yersinia]
- Detection & Mitigation
Module 7: MITM Attacks
- MITM via ARP
- SSL Strip Attack
- DNS Spoof + MITM
- Credential Hijacking [sslstrip, ettercap]
- Real-Time Sniffing
Module 8: Wireless Hacking Basics
- Wi-Fi Protocols
- Capturing WPA/WPA2 Handshake
- Monitor Mode
- Tool Setup [airmon-ng, airodump-ng]
- Password Cracking
Module 9: Wi-Fi Attacks
- De-authentication Attack
- Fake Access Point
- Handshake Replay
- Captive Portal [Fluxion, Wifiphisher]
- Wi-Fi Security Tips
Module 10: Evil Twin Attack
- Concept & Working
- Creating Evil Twin
- Phishing Page
- Capturing Credentials [Airgeddon]
- Defense Measures
Module 11: Network DoS Attacks
- What is DoS?
- DoS via DHCP
- DoS via ARP Flooding
- Tool Use [hping3]
- Prevention Techniques
Module 12: Social Engineering via Network
- Network Phishing
- Fake Updates Injection
- Credential Harvesting
- Tool Demo [BeEF]
- Awareness Tips
Module 13: Bypassing Firewalls
- Firewall Working
- Port Knocking
- Evading Filters
- ICMP Tunneling [hping3, iodine]
- Payload Delivery
Module 14: Network Vulnerability Exploitation
- Network Services Exploits
- Exploit Frameworks
- Live Demo [Metasploit]
- Reverse Shells
- Privilege Escalation
Module 15: Real World Network Pentest
- Complete Network Footprinting
- Attack Mapping
- All Attack Demos
- Report Writing
- Final Pentest Project
Course Fee: ₹199
Pay via UPI to:
9340654498@kotak
Pay Now via UPI App Click Here to Join on WhatsApp Facing Issue in Payment? Contact Us
Note: This is a live course. You will get the recording of every session along with lifetime access. You will also receive a certificate and tools within 24 hours after joining the WhatsApp group. Course content, assignments, and labs are provided through downloadable videos and PDFs.