Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) [Video]

More Information
  • Have a good understanding of how networks operate.
  • Understand how devices communicate with each other in a network.
  • Discover wireless networks within range.
  • Gather information about wifi networks
  • Discover connected devices to each wifi network within range
  • Disconnect any device from any network within range
  • Learn the main weaknesses of WEP encryption and how it can be cracked
  • Launch an interactive packet reply attack to crack WEP encryption
  • Launch a chopchop reply attack to crack WEP encryption
  • Launch a fragmentation attack to crack WEP encryption
  • Learn WPA/WPA2 weakness and the theory behind cracking it
  • Exploit WPS feature to crack WPA/WPA2 without a wordlist and without the need of any connected clients
  • Capture handshake and launch word list attacks
  • Create your own wordlist
  • Launch a wordlist attack using the GPU
  • Launch a word list attack using a rainbow table, and much more.

Welcome to this wifi cracking course! In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then will explore how we can exploit this method of communication to carry out a number of powerful attacks. At the end of the course you will learn how to configure wireless networks to protect them from these attacks. This course focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack - the attacks explained in this course are launched against real devices. All the attacks in this course are practical attacks that work against real wireless networks, all of the attacks are carried out against real networks. Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

Style and Approach

Hands-on: Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

  • You will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks, as well as a number of attacks that you can launch without the need to know the password such as controlling all the connections around you.
Course Length 4 hours 36 minutes
ISBN 9781789341676
Date Of Publication 18 Apr 2018


Zaid Sabih

Zaid Sabih is an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. He has good experience in ethical hacking; he started working as a pentester with iSecurity. In 2013, he started teaching his first network hacking course; this course received amazing feedback, leading him to publish a number of online ethical hacking courses, each focusing on a specific topic, all of which are dominating the ethical hacking topic on Udemy. Now Zaid has more than 300,000 students on Udemy and other teaching platforms, such as StackSocial, StackSkills, and zSecurity.