Switch to the store?

Kali Linux Advanced Wireless Penetration Testing [Video]

More Information
Learn
  • Get familiar with Wi-Fi network protocols 
  • Find open and hidden SSID's and crack Wi-Fi passwords 
  • Perform a Man in the Middle attack 
  • Curate a DoS attack on our victim 
  • Scan for all nearby Bluetooth devices 
  • Hack all Bluetooth devices
About

Kali Linux is a Debian-based Linux distribution designed primarily for Penetration Testing and Digital Forensics. It gives access to a large collection of security-related tools for professional security testing.

In this course, you will be discussing the different variety of tools and techniques to find hidden wireless networks and Bluetooth devices. You will learn how to enumerate the wireless network, cracking passwords, getting connected to any vulnerable wireless network and Bluetooth device. All the exercise in this course will be hands-on throughout this training.

The end goal of this course is to be able to connect, enumerate, extract information to any wireless-enabled device and network by utilizing various tools and software programs.

Style and Approach

This video course uses a step-by-step approach via real-world attack scenarios to help you master wireless penetration testing techniques.

Features
  • Conduct practical penetration into Wireless networks and seal all the cracks in the system.
  • Capture traffic, extract data, and analyze network traffic.
  • Perform a security test on any open or hidden Bluetooth device
Course Length 4 hours 3 minutes
ISBN 9781788832342
Date Of Publication 2 May 2018
NetworkMiner – Extract Files and Data
DarkStat – Analyzing Network Traffic
Wireless Network Detector and Sniffer
ArpSpoof – Setup Between Our Victim and Router
DriftNet – Displaying Victims Image Traffic
URLSnarf – Capturing Website Information/Data
BlueLog – Scanning for Bluetooth Devices in the Area
RedFang – Find Hidden Bluetooth Devices
Spooftooph – Bluetooth Spoofing
Bluesnarfing – Extract Data from Target
BlueJacking – Sending a Business Card to Target
Bluebugging – Taking Control Over Target

Authors

Vijay Kumar Velu

Vijay Kumar Velu is a Passionate Information Security Practitioner, Author, Speaker, Investor and Blogger. He has more than 12 years of IT industry experience, is a Licensed Penetration Tester, and has specialized in providing technical solutions to a variety of cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications including CEH, ECSA and CHFI.

He has Authored couple of books on Penetration Testing "Mastering Kali Linux for Advanced Penetration Testing - Second Edition" and "Mobile Application Penetration Testing".

For community Vijay servers as Chair member in NCDRC, India. Out of work, He enjoys playing music and doing charity.

Aubrey Love II

Aubrey Love II has been designing and developing websites for over 10+ years. He started off with a Commodore Vic20, on which he designed his first Hello World app at the age of 7. After attending several colleges and universities, he moved on and started his own website firm, in which he caters to all types of company, from startup ventures to Fortune 500 organizations.