Autoplay
Autocomplete
Previous Lesson
Complete and Continue
WiFi Hacking: Wireless Penetration Testing for Beginners
Training Overview
Description of Training
Video Overview (1:14)
Welcome to Wireless (WiFi) Network Hacking
Welcome and Course Overview (1:04)
Required Equipment for Wireless Hacking (2:55)
Disclaimer: This Course is for Defensive Purposes and Penetration Testing Only!
Quiz 1: Required Equipment Quiz
Configuring WiFi Hacking Tools
Installing Virtual Box (1:59)
Installing Kali Linux in a VirtualBox (6:13)
Updating Kali Linux to the Latest Software (2:51)
Setup the USB WiFi Card with Kali Linux (1:36)
Quiz 2: Configuring WiFi Hacking Tools Quiz
Setting Up Your Wireless Access Points
Configuring Wireless Equivalent Privacy (WEP) on the Access Point (3:12)
Configuring WiFi Protected Access v2 (WPA2) on the Access Point (3:58)
Quiz 3: Setting Up Your Wireless Access Points Quiz
Wireless Networking Concepts
Types of Wireless Networks (3:39)
Concealing Your MAC Address (2:37)
Changing Your MAC Address to Impersonate Other Users (4:15)
What is Promiscuous Mode (1:27)
Setting Up Promiscuous Mode (1st Method) (4:11)
Setting Up Promiscuous Mode (2nd Method) (1:10)
Introduction to Airodump-ng (2:29)
Gathering Wireless (WiFi) Information with Airodump-ng (5:24)
Quiz 4: Wireless Networking Concepts Quiz
Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP) (2:59)
How to Hack WEP (2:08)
Hacking WEP Using the Fake Authentication and ARP Replay Attacks (7:28)
Connect to a WiFi Network in Kali Linux Using the WEP Key We Found (2:02)
Quiz 5: Wired Equivalent Privacy (WEP) Quiz
WiFi Protected Access (WPA/WPA2)
WiFi Protected Access (WPA/WPA2) (3:16)
Brute Force Attacks (3:30)
Dictionary Attacks (2:58)
Downloading and Using Pre-made Dictionaries (4:07)
Creating Your Own Dictionary (2:12)
Hacking WPA/WPA2 with a Dictionary Attack (6:45)
Quiz 6: WiFi Protected Access (WPA/WPA2) Quiz
WiFi Protected Setup (WPS)
WiFi Protected Setup (WPS) (2:33)
Attacking the WPS Configured Network (9:24)
Quiz 7: Wireless Protected Setup (WPS) Quiz
Conclusion
Conclusion (2:35)
What is Promiscuous Mode
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 30,000+ Top Cyber Security Courses And Labs.
UPGRADE NOW