WiFi Hacking: Wireless Penetration Testing for Beginners
Video description
A Complete Guide to Hacking WiFi (WEP, WPA, and WPA2) Wireless Security and How to Exploit (Pentest) Their Vulnerabilities!
About This Video
Great course. Step by step instructions.
Good quality audio and video lectures.
Easy to understand instructor - he explains everything in detail.
In Detail
This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, …
WiFi Hacking: Wireless Penetration Testing for Beginners
Video description
A Complete Guide to Hacking WiFi (WEP, WPA, and WPA2) Wireless Security and How to Exploit (Pentest) Their Vulnerabilities!
About This Video
Great course. Step by step instructions.
Good quality audio and video lectures.
Easy to understand instructor - he explains everything in detail.
In Detail
This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks.
Chapter 1 : Welcome to Wireless (Wi-Fi) Network Hacking
Welcome and Course Overview
00:01:05
Required Equipment for Wireless Hacking
00:02:56
Chapter 2 : Configuring Wi-Fi Hacking Tools
Installing Virtual Box
00:02:00
Installing Kali Linux in a VirtualBox
00:06:13
Updating Kali Linux to the Latest Software
00:02:51
Setup the USB Wi-Fi Card with Kali Linux
00:01:37
Chapter 3 : Setting Up Your Wireless Access Points
Configuring Wireless Equivalent Privacy (WEP) on the Access Point
00:03:12
Configuring Wi-Fi Protected Access v2 (WPA2) on the Access Point
00:03:59
Chapter 4 : Wireless Networking Concepts
Types of Wireless Networks
00:03:39
Concealing Your MAC Address
00:02:37
Changing Your MAC Address to Impersonate Other Users
00:04:16
What is Promiscuous Mode?
00:01:28
Setting Up Promiscuous Mode (1st Method)
00:04:11
Setting Up Promiscuous Mode (2nd Method)
00:01:11
Introduction to Airodump-ng
00:02:29
Gathering Wireless (Wi-Fi) Information with Airodump-ng
00:05:24
Chapter 5 : Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP)
00:02:59
How to Hack WEP
00:02:08
Hacking WEP Using the Fake Authentication and ARP Replay Attacks
00:07:29
Connect to a Wi-Fi Network in Kali Linux Using the WEP Key We Found
00:02:02
Chapter 6 : Wi-Fi Protected Access (WPA/WPA2)
Wi-Fi Protected Access (WPA/WPA2)
00:03:16
Brute Force Attacks
00:03:31
Dictionary Attacks
00:02:58
Downloading and Using Pre-made Dictionaries
00:04:08
Creating Your Own Dictionary
00:02:13
Hacking WPA/WPA2 with a Dictionary Attack
00:06:45
Chapter 7 : Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS)
00:02:34
Attacking the WPS Configured Network
00:09:24
Chapter 8 : Conclusion
Conclusion
00:02:31
BONUS: Where to go from here
00:01:55
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept