English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 2h 49m | 709 MB
Enhance your wireless penetration testing skills with Kali Linux 2017
Kali Linux is rated as the #1 security operating system for hackers. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. Kali Linux has gained popularity over the last few years with the rise of hacker groups (Anonymous, Lizard Squad, Ghost Squad Hackers, and others).
Kali Linux was built for hackers, by hackers. Throughout this course, we will be discussing new products to add to your ethical pen testing tool belt, including antennas, Android devices, and laptops. We will learn how to use high-powered antennas to search and reach wireless networks from afar, and then utilize a variety of tools to find hidden wireless networks and crack passwords.
The end goal of this course is to be able to connect to a wireless network, by utilizing various tools and software programs, and hack into wireless networks, even if they are protected by the WEP/WPS/WPA/WPA2 security protocols.
The purpose of this course is to assist in the explanation of wireless penetration testing and perform security analysis. This is ideal for those who have some level of knowledge of Linux-based operating systems and some scripting languages.
What You Will Learn
- Understand virtual machines and install Kali Linux.
- Test your website's vulnerabilities by utilizing tools such as WPScan, Burp Suite, and XSSER!
- Test your home or office wireless network's security measures.
- Hack and intercept traffic from Bluetooth-enabled devices.
- Hack wireless passwords using various techniques
- Learn how to increase your wireless security measures and Bluetooth features based on live, real-world hacking ethics.
- Configure and scan wireless networks with the Yagi antenna
- Successfully brute-force WEP/WPS/WPA/WPA2 passwords
01 The Course Overview
02 Wireless Network Signals
03 Wi-Fi Pineapple
04 Yagi Antenna
05 Getting Used to Kali
06 Creating a Password Dictionary
07 Wireless Security Protocols
08 Scanning for Wireless Networks
09 Cracking Wi-Fi Passwords
10 Hacking_Cracking Our Way into the Target
11 Exploiting Our Target
12 Scanning Airwaves
13 Hunting Down Networks
14 MitM Attacks
15 Finding Ourselves an Access Point
16 Setting up Lab
17 Scanning WEP Networks
18 Cracking WEP Connections
19 Intercepting Connections (URLSnarf)
20 Setting up Our Lab
21 Scanning WPS Networks
22 Brute Forcing WPS Connections
23 Intercepting Connections (EtterCap)
24 Setting up Our Lab
25 Search for WPA_WPA2 Networks
26 Brute Forcing WPA_WPA2 Connections
27 Intercepting Connections (WireShark)