WiFi Penetration Testing (Ethical Hacking) From Scratch

WiFi Penetration Testing (Ethical Hacking) From Scratch

Learn how to hack many different forms of WiFi from a penetration testers perspective

What you’ll learn

  • Perform WiFi assessments based on commonly known vulnerabilities, exploits and hacking methods
  • Gain a better understanding into the world of ethical hacking
  • Better understand signal frequency

Requirements

Description

This course aims to teach student’s how to perform tasks of an ethical hacker/penetration tester specifically from a WiFi hacking perspective. Little to no prior knowledge is required for this course, however knowing a few Linux commands would be beneficial. The course covers the entire process of WiFi based ethical hacking from a professional penetration testers point of view.

The first set of lectures allows the student to understand what WiFi is and how it works from a technical perspective as well as it’s history and associated weaknesses.

The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. The course also covers potential pitfalls that an ethical hacker may encounter when trying to hack specific encryption levels of WiFi as well as how to combat such issues.

Finally the course concludes with different tools and methods that can be used to break encryption keys to ensure the greatest likelihood of success.

Who this course is for:

  • Beginner level students who are interested in the world of ethical hacking and penetration testing

Course content

1 section • 69 lectures • 8h 3m total length
  • 4.02-security-intro-part2

    04:40

  • 4.03-security-intro-part3

    06:24

  • 4.04-security-intro-part4

    08:54

  • 6.01-wifi-security-intro

    08:11

  • 6.02-wifi-security-wep

    07:13

  • 6.03-wifi-security-wep-part2-R1

    08:08

  • 6.04-wifi-security-wep-part3-R1

    07:04

  • 6.05-wifi-security-wpa-R1

    06:05

  • 6.06-wifi-security-dot1x-R1

    08:37

  • 6.07-wifi-security-wpa2-R1

    07:39

  • 6.08-wifi-security-psk-enterprise-modes-R1

    07:19

  • 6.09-wifi-security-wps-R1

    06:02

  • 7.01-equipment-intro

    07:35

  • 7.02-equipment-intro2

    06:58

  • 7.03-equipment-intro3

    08:15

  • 7.04-kali-linux-wireless-tools

    06:56

  • 7.05-using-kali-linux-iw

    06:03

  • 7.06-monitor-mode-airmon

    06:50

  • 7.06a-monitor-mode-wireshark

    06:50

  • 7.06b-monitor-mode-wireshark-airodump

    06:30

  • 7.07-injection-testing

    06:57

  • 7.08-injection-testing-2

    06:08

  • 8.01-wep-passive-attacks

    07:56

  • 8.02-wep-attacks-passive-part2

    06:27

  • 8.04-wep-attacks-active

    08:47

  • 8.05-wep-attacks-active-fragmentation

    08:12

  • 8.05a-wep-attacks-fragmentation-wireshark

    06:13

  • 8.06-wep-isolated-client

    06:46

  • 8.07-wep-cafe-latte-demo

    05:39

  • 8.08-wep-cafe-latte-and-hirte

    08:30

  • 9.01-wps-reaver-part1

    07:48

  • 9.02-wps-reaver-part2

    06:37

  • 9.03-wps-reaver-part3

    07:37

  • 10-10.hashcat-ec2

    07:04

  • 10.01-wpa-and-wpa2-psk

    07:11

  • 10.01a-wpa-and-wpa2-psk-contd

    06:07

  • 10.02-wpa-and-wpa2-psk-demo

    06:37

  • 10.03-wpa-and-wpa2-psk-demo2

    06:03

  • 10.04-wpa-and-wpa2-psk-wordlists

    07:07

  • 10.04a-wpa-and-wpa2-deauth

    06:59

  • 10.05-wpa-and-wpa2-psk-isolated-clients

    07:27

  • 10.06-wpa-and-wpa2-psk-isolated-clients-demoR1

    06:54

  • 10.07-hashcat-motivation

    06:38

  • 10.07a-hashcat-intro

    06:49

  • 10.08-wpa-and-wpa2-psk-hashcat-demo

    06:33

  • 10.09-wpa-and-wpa2-psk-hashcat-demo-part2

    05:36

  • 10.11-hashcat-ec2-part2

    07:36

  • 10.12-hashcat-ec2-part3

    07:07

  • 10.13-hashcat-ec2-part4

    06:55

  • 11.01-social-fluxion-intro

    06:53

  • 11.02-social-fluxion-demo

    06:59

  • 11.03-social-fluxion-demo-part2

    06:31

  • 11.04-social-fluxion-demo-part3

    06:04

  • 12-01-conclusions

    06:29

  • 12.02-conclusions-part2

    07:36

Created by: TWR Internet Solutions Ltd, Providing high quality, affordable material
Last updated 10/2017
English
English [Auto]
Direct Download Available
3.7
(523 ratings)
39,213 students
https://www.udemy.com/course/wifi-hacking-from-a-penetration-testers-perspective/

Download link



Friendly Websites




Related Posts

Add a Comment

Your email address will not be published. Required fields are marked *