Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) [Video]
-
Free ChapterIntroduction
-
Preparation
-
Network Basics
- Networks Basics
- Connecting a Wireless Adapter To Kali
- What is MAC Address & How To Change It
- Wireless Modes - Managed & Monitor Mode Explained
- Enabling Monitor Mode Manually (2nd method)
- Enabling Monitor Mode Using airmon-ng (3rd method)
- Sniffing Basics - Using Airodump-ng
- Targeted Sniffing Using Airodump-ng
- Deauthentication Attack (Disconnecting Any Device From The Network)
- Discovering Hidden Networks
- Connecting To Hidden Networks
- Bypassing Mac Filtering (Blacklists & Whitelists)
-
WEP Cracking
-
WPA/WPA2 Cracking
-
WPA/WPA2 Cracking - Exploiting WPS
-
WPA/WPA2 Cracking - Wordlist Attacks
- Theory Behind Cracking WPA/WPA2
- How To Capture The Handshake
- Creating a Wordlist
- Cracking Key Using A Wordlist Attack
- Saving Cracking Progress
- Using Huge Wordlists With Aircrack-ng Without Wasting Storage
- Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
- Speeding the Cracking Process Using Rainbow Tables
- Cracking WPA/WPA2 Much Faster Using GPU - Part 1
- Cracking WPA/WPA2 Much Faster Using GPU - Part 2
-
WPA/WPA2 Cracking - WPA/WPA2 Enterprise
-
Protection
Welcome to this wifi cracking course! In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then will explore how we can exploit this method of communication to carry out a number of powerful attacks. At the end of the course you will learn how to configure wireless networks to protect them from these attacks. This course focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack - the attacks explained in this course are launched against real devices. All the attacks in this course are practical attacks that work against real wireless networks, all of the attacks are carried out against real networks. Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.
Style and Approach
Hands-on: Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)
- Publication date:
- April 2018
- Publisher
- Packt
- Duration
- 4 hours 36 minutes
- ISBN
- 9781789341676