~Get Your Files Here !/1. Introduction/1. Introduction.mp421.56MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/1. What is Fluxion.mp425.68MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/2. Downloading Fluxion.mp45.6MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/3. Installing Fluxion.mp416.61MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/4. Capturing handshake with Fluxion.mp425.89MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/5. Capturing wifi key with Fluxion.mp443.89MB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/1. Introduction to Wifiphisher.mp423.53MB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/2. Installing Wifiphisher.mp47.97MB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/3. Evil Twin Attack using Wifiphisher.mp428.26MB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/1. Introduction to our Evil Twin Attack System.mp425.31MB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/2. Creating a fake webpage and webserver.mp431.6MB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/3. Understanding how the fake website works.mp4105.62MB
~Get Your Files Here !/13. Installing our Access Point programs/1. Why we need DHCP and DNS.mp417.34MB
~Get Your Files Here !/13. Installing our Access Point programs/2. Installing hostapd and dnsmasq.mp47.44MB
~Get Your Files Here !/13. Installing our Access Point programs/3. Configuring hostapd and dnsmasq.mp438.22MB
~Get Your Files Here !/14. How to start and stop our Access Point/1. Starting our access point.mp437.56MB
~Get Your Files Here !/14. How to start and stop our Access Point/2. How to stop our access point.mp435.59MB
~Get Your Files Here !/15. Implementing SSL and HSTS/1. How to implement SSL for HSTS sites like facebook and gmail.mp480.41MB
~Get Your Files Here !/15. Implementing SSL and HSTS/2. Testing our SSL enabled Access Point.mp441.04MB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/1. Capturing handshakes.mp474.92MB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/2. Stopping handshake capture and restoring wlan.mp412.71MB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/3. How to verify wifi keys using the handshake file.mp421.44MB
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/1. Deauthentication attack and a full attack demo.mp496.23MB
~Get Your Files Here !/18. Bonus Lecture/1. Bonus Lecture.mp425.64MB
~Get Your Files Here !/2. Installing Kali Linux on a laptop/1. Creating a bootable USB pendrive containing Kali Linux.mp431.86MB
~Get Your Files Here !/2. Installing Kali Linux on a laptop/2. Installing Kali Linux onto the laptop.mp4106.11MB
~Get Your Files Here !/3. Connecting to the Internet/1. Connecting to the Internet.mp46.74MB
~Get Your Files Here !/4. Setting apt sources list - for installing additional programs/1. How to configure apt resource file, do updates and install programs.mp440.86MB
~Get Your Files Here !/5. Intro to Kali Linux Desktop/1. Intro to Kali Linux Desktop.mp442.97MB
~Get Your Files Here !/6. Intro to Kali Linux command line/1. Basic linux commands.mp448.13MB
~Get Your Files Here !/7. Setting up a practice Access Point/1. How to setup a practice Access Point using a spare old access point.mp437.29MB
~Get Your Files Here !/8. Intro to Evil Twin Attacks/1. Introduction to Evil Twin Attacks.mp424.27MB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/1. What is Airgeddon.mp442.69MB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/2. Installing Airgeddon.mp433.55MB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/3. Launching an Airgeddon Evil Twin Attack.mp491.84MB