MikroTik DoH against DNS spoofing attacks

Understand DNS spoofing using Kali Linux, protect network with MikroTik DNS over HTTPS

***All Hacking techniques (Arp Spoof & DNS Spoof) that are shown in this course are for educational purpose. Please use them with caution and ONLY in the LABs of this course***

What you'll learn
  • Connect the MikroTik Router to the internet and share the service to LAN users
  • Download and install Kali Linux machine on Virtualbox
  • Make Kali Linux work on the same network as your PC
  • Upgrade Kali Linux
  • Change the root password
  • Install on Kali Linux terminator, Leafpad and Bettercap
  • Install Zenmap for network devices discovery
  • Understand how ARP works
  • Understand how Hackers use ARP spoofing to be a MITM
  • Understand how to become a MITM using Bettercap tool on Kali Linux
  • Understand how to configure DNS Spoofing on Kali Linux
  • Configure DoH on MikroTik to avoid DNS spoofing (w/o certificates)
  • Basic TCP/IP knowledge
  • Basic knowledge with MikroTik

Since MikroTik RouterOS version 6.47, there is a possibility to configure DNS over Https on MikroTik routers. This feature was not enabled before RouterOS v6.47

For this reason, I am designing this course to show you how you can benefit from this feature specially against the DNS spoofing attacks that may happen against your PC.
To be able to show you the importance of this feature, I am going to show you how the DNS spoof happens, which means that we will do the same techniques that a hacker use to run his DNS spoofing attacks. In other word, we are going to attack on PC from a Kali Linux machine and I am going to show you all steps that a hacker use to accomplish this mission. Once done, I will show you how to configure DoH on MikroTik router to overcome the DNS spoofing attack.
This course will be a mix of some hacking techniques to run the DNS spoofing using Kali linux machine and the solution that MikroTik providing us to use the DoH to overcome this problem, that means you will learn and be able to run a DNS spoofing attack against your PC and to use the MikroTik DoH feature to solve this problem.
For this course you require to have 1 PC and 1 MikroTik router. Also you require to have internet connectivity and 1 UTP cable.
If you want to learn the technique that hackers use to run a DNS spoofing attack and how to overcome this attack by using the DoH feature provided by MikroTik since version 6.47, then I advise you to register in this course and I will explain for you all details about those topics.

Your Instructor

Maher  Haddad
Maher Haddad

Hello everyone. My name is Maher Haddad and I am a Certified MikroTik Trainer, Cisco Authorized Instructor and LigoWave Authorized Trainer.

I have decided to make this online school to share my knowledge to the community. All my courses are based on theory and hands-on LABS so you can practise while learning.

More than 100K happy students have joined mynetworktraining.com up to year 2022.

I hope you will enjoy watching my courses.

Frequently Asked Questions

When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
After enrolling to the membership, you have unlimited access to this course for as long as your membership is valid - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 14 days and we will give you a full refund.

Get started now!