01 Introduction
02 Weaponizing
03 Installing Kali Linux As Virtual Machine (Optional)
04 Information Gathering
05 Spying
06 Spying _ MITM Method 1 - Bad USB Attack
07 Spying _ MITM Method 2 - ARP Poisoning
08 Spying _ MITM Method 3 - Fake Access Point (Honey Pot)
09 Detection & Protection
10 Exploitation (Gaining Access)
11 Exploitation - Rubber Ducky Scripts
12 Detecting Malicious Files
13 Bonus Section
https://mega.nz/folder/sv1SmZJT#ilxDDFoIr4w8V7MCGQ9L6Q
02 Weaponizing
03 Installing Kali Linux As Virtual Machine (Optional)
04 Information Gathering
05 Spying
06 Spying _ MITM Method 1 - Bad USB Attack
07 Spying _ MITM Method 2 - ARP Poisoning
08 Spying _ MITM Method 3 - Fake Access Point (Honey Pot)
09 Detection & Protection
10 Exploitation (Gaining Access)
11 Exploitation - Rubber Ducky Scripts
12 Detecting Malicious Files
13 Bonus Section
https://mega.nz/folder/sv1SmZJT#ilxDDFoIr4w8V7MCGQ9L6Q