Introduction
  • Introduction
Setup
  • Create a USB for Installation
  • Installation Procedure Part 1
  • Installation Procedure Part 2
  • Improve Safety and Anonymity of your Browser
  • Fedora KDE Desktop Orientation (optional)
  • Terminal Basics Part 1
  • Terminal Basics Part 2
  • Wireshark Setup Part 1
  • Wireshark Setup Part 2
Anonymity Online
  • How to Connect to the Internet via Proxy Part 1
  • How to Connect to the Internet via Proxy Part 2
  • How to set up a Proxy Server for Traffic Monitoring Part 1
  • How to set up a Proxy Server for Traffic Monitoring Part 2
  • How to set up a Proxy Server for Traffic Monitoring Part 3
  • How to set up a Proxy Server for Traffic Monitoring Part 4
  • How to set up a Proxy Server for Traffic Monitoring Part 5
  • How to Connect to a VPN
  • How to set up your own VPN Server Part 1
  • How to set up your own VPN Server Part 2
  • How to set up your own VPN Server Part 3
  • How to set up your own VPN Server Part 4
  • Monitor VPN Server Traffic
  • Tor Browser
  • How to set up a Tor Relay Part 1
  • How to set up a Tor Relay Part 2
Wireless
  • Installing aircrack-ng
  • Capturing WPA2 Handshake
  • Crunch Password Generator Installation
  • Crunch Password Generator Rule Sets
  • Crunch Password Generator in Combination with aircrack-ng
  • Installing NVIDIA Drivers
  • Installing HashCat
  • Preparing the Capture File for HashCat
  • HashCat Part 1
  • HashCat Part 2
  • Changing your mac address
  • Set up a Sandboxed Environment for our Hotspot Part 1
  • Set up a Sandboxed Environment for our Hotspot Part 2
  • Setting up an Open Wireless Hotspot Part 1
  • Setting up an Open Wireless Hotspot Part 2
  • Setting up the Fake DNS Resolutions Part 1
  • Setting up the Fake DNS Resolutions Part 2
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 1
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 2
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 3
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 4
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 5
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 6
  • Fighting against HTTPS, Site Cloning and Credentials Harvesting Part 7
  • Disconnect Clients from a Wireless Access Point
Site Cloning
  • How to Clone Websites
Bitsquatting
  • Bitsquatting Part 1
  • Bitsquatting Part 2
  • Bitsquatting Part 3
  • Bitsquatting Part 4
  • Bitsquatting Part 5
Bad USB (USB Keylogger Deployment)
  • Overview
  • Requirements
Setting up Windows Virtual Machine
  • Installing Windows VM Part 1
  • Installing Windows VM Part 2
  • Install CodeBlocks with a Compiler
  • Download and Compile the Keylogger
Server Setup
  • Set up a Server for Keylogger
  • Upload the Keylogger to the Server
Arduino USB Programming
  • Download Arduino
  • Set up Arduino and Teensyduino
  • Confirm that everything works
  • Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 1
  • Gaining Admin Access on Windows 7, 8, 8.1, and 10 Part 2
  • Generate Files in System32
  • Sets of Commands to be Executed Part 1
  • Sets of Commands to be Executed Part 2
  • Call Functions and Run Commands
Windows Scripts
  • Powershell Script Part 1
  • Powershell Script Part 2
  • Powershell Script Part 3
  • Visual Basic Script
  • Compile and Load
Decryption for the Keylogger Files
  • Decrypt Part 1
  • Decrypt Part 2
  • Decrypt Part 3
Live Demo
  • Demo Part 1
  • Demo Part 2
Chapter Recap
  • Recap
Game Hacking Announcement