English | Size: 1.72 GB
Genre: eLearning
What you’ll learn
Connect the MikroTik Router to the internet and share the service to LAN users
Download and install Kali Linux machine on Virtualbox
Make Kali Linux work on the same network as your PC
Upgrade Kali Linux
Change the root password
Install on Kali Linux terminator, Leafpad and Bettercap
Install Zenmap for network devices discovery
Understand how ARP works
Understand how Hackers use ARP spoofing to be a MITM
Understand how to become a MITM using Bettercap tool on Kali Linux
Understand how to configure DNS Spoofing on Kali Linux
Configure DoH on MikroTik to avoid DNS spoofing (w/o certificates)
***All Hacking techniques (Arp Spoof & DNS Spoof) that are shown in this course are for educational purpose. Please use them with caution and ONLY in the LABs of this course***
Since MikroTik RouterOS version 6.47, there is a possibility to configure DNS over Https on MikroTik routers. This feature was not enabled before RouterOS v6.47
For this reason, I am designing this course to show you how you can benefit from this feature specially against the DNS spoofing attacks that may happen against your PC.
To be able to show you the importance of this feature, I am going to show you how the DNS spoof happens, which means that we will do the same techniques that a hacker use to run his DNS spoofing attacks. In other word, we are going to attack on PC from a Kali Linux machine and I am going to show you all steps that a hacker use to accomplish this mission. Once done, I will show you how to configure DoH on MikroTik router to overcome the DNS spoofing attack.
This course will be a mix of some hacking techniques to run the DNS spoofing using Kali linux machine and the solution that MikroTik providing us to use the DoH to overcome this problem, that means you will learn and be able to run a DNS spoofing attack against your PC and to use the MikroTik DoH feature to solve this problem.
For this course you require to have 1 PC and 1 MikroTik router. Also you require to have internet connectivity and 1 UTP cable.
If you want to learn the technique that hackers use to run a DNS spoofing attack and how to overcome this attack by using the DoH feature provided by MikroTik since version 6.47, then I advise you to register in this course and I will explain for you all details about those topics.
Who this course is for:
Anyone interested to know the right way of using DoH on MikroTik to be protected against DNS Spoofing
nitroflare.com/view/08B6939D6C1467B/mikrotik-doh-against-dns-spoofing-attacks.20.2.part1.rar
nitroflare.com/view/B5C01557579A779/mikrotik-doh-against-dns-spoofing-attacks.20.2.part2.rar
nitroflare.com/view/D46E11772E9707D/mikrotik-doh-against-dns-spoofing-attacks.20.2.part3.rar
nitroflare.com/view/513505DCF9A5CA9/mikrotik-doh-against-dns-spoofing-attacks.20.2.part4.rar
nitroflare.com/view/D3A3CF8C8254DEE/mikrotik-doh-against-dns-spoofing-attacks.20.2.part5.rar
rapidgator.net/file/a05accfe9c3216440da1a26a8c9075e5/mikrotik-doh-against-dns-spoofing-attacks.20.2.part1.rar.html
rapidgator.net/file/84498276c736754ebe880b471ef2768c/mikrotik-doh-against-dns-spoofing-attacks.20.2.part2.rar.html
rapidgator.net/file/7c50377e66bc2b3f926fade04235f65a/mikrotik-doh-against-dns-spoofing-attacks.20.2.part3.rar.html
rapidgator.net/file/f6b7f89166b7bc7e760ff0e6f36ed52d/mikrotik-doh-against-dns-spoofing-attacks.20.2.part4.rar.html
rapidgator.net/file/820ee5ffed89b4de77fabf50b1151a3f/mikrotik-doh-against-dns-spoofing-attacks.20.2.part5.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9