WiFi Hacking: Wireless Penetration Testing for Beginners
This is a subtitle. Get more detailed about your course here!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.
Welcome and Course Overview
Required Equipment for Wireless Hacking
Required Equipment Quiz
Installing Virtual Box
An Important Message About the Course
Installing Kali Linux in a VirtualBox
Updating Kali Linux to the Latest Software
Setting up the USB WiFi Card with Kali Linux
Configuring WiFi Hacking Tools Quiz
Configuring Wireless Equivalent Privacy (WEP) on the Access Point
Configuring WiFi Protected Access v2 (WPA2) on the Access Point
Setting Up Your Wireless Access Points Quiz
Types of Wireless Networks
Concealing Your MAC Address
Changing Your MAC Address to Impersonate Other Users
What is Promiscuous Mode
Setting Up Promiscuous Mode (1st Method)
Setting Up Promiscuous Mode (2nd Method)
Introduction to Airodump-ng
Gathering Wireless (WiFi) Information with Airodump-ng
Wireless Networking Concepts Quiz
Wired Equivalent Privacy (WEP)
How to Hack WEP
Hacking WEP Using the Fake Authentication and ARP Replay Attacks
Connect to a WiFi Network in Kali Linux Using the WEP Key We Found
Wired Equivalent Privacy (WEP) Quiz
WiFi Protected Access (WPA and WPA2)
Brute Force Attacks
Dictionary Attacks
Downloading and Using Pre-made Dictionaries
Creating Your Own Dictionary
Hacking WPA and WPA2 with a Dictionary Attack
WiFi Protected Access (WPA/WPA2) Quiz
WiFi Protected Setup (WPS)
Attacking the WPS Configured Network
Wireless Protected Setup (WPS) Quiz
Conclusion
WiFi - Cracking WPS