Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Welcome to Wireless (WiFi) Network Hacking

    • Welcome and Course Overview

    • Required Equipment for Wireless Hacking

    • Required Equipment Quiz

  • 2

    Configuring WiFi Hacking Tools

    • Installing Virtual Box

    • An Important Message About the Course

    • Installing Kali Linux in a VirtualBox

    • Updating Kali Linux to the Latest Software

    • Setting up the USB WiFi Card with Kali Linux

    • Configuring WiFi Hacking Tools Quiz

  • 3

    Setting Up Your Wireless Access Points

    • Configuring Wireless Equivalent Privacy (WEP) on the Access Point

    • Configuring WiFi Protected Access v2 (WPA2) on the Access Point

    • Setting Up Your Wireless Access Points Quiz

  • 4

    Wireless Networking Concepts

    • Types of Wireless Networks

    • Concealing Your MAC Address

    • Changing Your MAC Address to Impersonate Other Users

    • What is Promiscuous Mode

    • Setting Up Promiscuous Mode (1st Method)

    • Setting Up Promiscuous Mode (2nd Method)

    • Introduction to Airodump-ng

    • Gathering Wireless (WiFi) Information with Airodump-ng

    • Wireless Networking Concepts Quiz

  • 5

    Wired Equivalent Privacy (WEP)

    • Wired Equivalent Privacy (WEP)

    • How to Hack WEP

    • Hacking WEP Using the Fake Authentication and ARP Replay Attacks

    • Connect to a WiFi Network in Kali Linux Using the WEP Key We Found

    • Wired Equivalent Privacy (WEP) Quiz

  • 6

    WiFi Protected Access (WPA/WPA2)

    • WiFi Protected Access (WPA and WPA2)

    • Brute Force Attacks

    • Dictionary Attacks

    • Downloading and Using Pre-made Dictionaries

    • Creating Your Own Dictionary

    • Hacking WPA and WPA2 with a Dictionary Attack

    • WiFi Protected Access (WPA/WPA2) Quiz

  • 7

    WiFi Protected Setup (WPS)

    • WiFi Protected Setup (WPS)

    • Attacking the WPS Configured Network

    • Wireless Protected Setup (WPS) Quiz

  • 8

    Conclusion

    • Conclusion

    • WiFi - Cracking WPS

About the instructor

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...