1 00:00:00,168 --> 00:00:02,585 (soft tones) 2 00:00:06,750 --> 00:00:08,670 - Welcome to lesson five, 3 00:00:08,670 --> 00:00:11,900 Exploiting Wired and Wireless Networks. 4 00:00:11,900 --> 00:00:15,060 In this lesson, you will learn how to exploit 5 00:00:15,060 --> 00:00:18,370 Windows name resolution-based vulnerabilities, 6 00:00:18,370 --> 00:00:22,940 and how to perform DNS cache poisoning attacks. 7 00:00:22,940 --> 00:00:24,610 You will learn how to attack 8 00:00:24,610 --> 00:00:26,980 and exploit SMB implementations. 9 00:00:26,980 --> 00:00:31,270 You will also learn how to attack SNMP, SMTP, 10 00:00:31,270 --> 00:00:33,490 and FTP vulnerabilities. 11 00:00:33,490 --> 00:00:37,220 You will also learn how to perform the pass-the-hash, 12 00:00:37,220 --> 00:00:40,810 man-in-the-middle, and SSL stripping attacks. 13 00:00:40,810 --> 00:00:44,340 We will go over an overview of Denial of Service, 14 00:00:44,340 --> 00:00:47,280 and Distributed Denial of Service attacks. 15 00:00:47,280 --> 00:00:50,700 You will learn how to perform Network Access Control, 16 00:00:50,700 --> 00:00:52,460 otherwise known as NAC, 17 00:00:52,460 --> 00:00:55,760 and how to actually bypass those implementations 18 00:00:55,760 --> 00:00:59,630 and perform other attacks like VLAN hopping attacks. 19 00:00:59,630 --> 00:01:01,980 In this lesson, you will also learn 20 00:01:01,980 --> 00:01:05,300 what are rogue access points and evil twins. 21 00:01:05,300 --> 00:01:09,100 You will learn how to perform deauthentication attacks, 22 00:01:09,100 --> 00:01:12,690 and how to attack the preferred network list. 23 00:01:12,690 --> 00:01:15,990 We will go over how to jam wireless signals, 24 00:01:15,990 --> 00:01:19,223 cost interference, and what is actually wardriving. 25 00:01:20,190 --> 00:01:21,380 You will also learn 26 00:01:21,380 --> 00:01:25,733 how to attack web and WPA wireless networks.