Autoplay
Autocomplete
Previous Lesson
Complete and Continue
WiFi Hacking Wireless Penetration and Security
Section 1. Introduction and 01-Setting Up The Lab Environment
How to Use LMS & Start Learning? (6:19)
1. Introduction (1:44)
2. 01-Overview (5:00)
3. 02-Installing Virtual software and OS (4:38)
4. 03-Setup OS in VMware (2:19)
5. 04-First look of Kali Linux (3:30)
6. 05-Creating Snapshots (5:30)
Resources
Assessment Exercise- 01
Section 2. Wireless Basics
7. 01-What is Wireless Network (5:02)
8. 02-Wifi-Adapter (2:10)
9. 03-Wifi-Adapter Modes (6:15)
10. 04-Wlan Frequencies Bands and Channels (7:19)
11. 05-MAC Address (6:45)
12. 06-Beacon Frames (6:54)
Resources
Assessment Exercise- 02
Section 3. Wireless Advanced Concepts
13. 01-Packet Sniffing Basics (3:12)
14. 02-Target Sniffing (2:03)
15. 03-Packet Sniffing on 5GHz Network (6:16)
16. 04-Deauthentication Attack (5:28)
17. 05-Discovering Hidden SSIDs (2:02)
18. 06-MAC Address Verification (8:20)
19. 07-Maximize the power of WiFi Adapter (4:46)
Resources
Assessment Exercise- 03
Section 4. WEP Protocol and Attack
20. 01-WEP Protocol (6:23)
21. 02-WEP Attack Basics (5:05)
22. 03-WEP Attack No Clients (8:47)
Resources
Assessment Exercise- 04
Section 5. WPS Attack
23. 01-What is WPS (2:50)
24. 02-WPS Attack (4:47)
25. 03-Unlock WPS (8:40)
Resources
Assessment Exercise- 05
Section 6. WPA-WPA2 Protocol
26. 01-WPA-WPA2-Protocol (9:56)
27. 02-Cracking WPA-WPA2-Protocol (3:44)
Resources
Assessment Exercise- 06
Section 7. WPA-WPA2 Word List Attack
28. 01-WPA-WPA2 WordList Attack (5:38)
29. 02-WPA-WPA2 WordList Attack Part-2 (2:35)
30. 03 Saving Dictionary Progress (7:36)
31. 04 Speedup Cracking Using Rainbow Tables (6:03)
Resources
Assessment Exercise- 07
Section 8. WPA-WPA2 Evil Twin Attack
32. 01 Evil Twin Theory (2:39)
33. 02 Evil Twin Installation (3:20)
34. 03 Evil Twin Attack (8:13)
Resources
Assessment Exercise- 08
Section 9. WPA-WPA2 CAPTIVE PORTALS Attack
35. 01 What is Captive Portal (2:19)
36. 02 What is MitM (5:52)
37. 03-Captive Portal MitM Attack (5:23)
Resources
Assessment Exercise- 09
Section 10. WPA2 Enterprise
38. 01-What is WPA2 Enterprise (2:57)
39. 02-How to Hack WPA2 Enterprise (1:33)
40. 03-Hacking WPA2 Enterprise Part1 (6:38)
41. 04-Hacking WPA2 Enterprise Part2 (2:12)
Resources
Assessment Exercise- 10
Section 11. Maximum Utilization of Minimum Resources
42. 01 Problem Scenarios (2:23)
43. 02-Hardware Requirements (1:09)
44. 03-Hardware (1:36)
Resources
Assessment Exercise- 11
Section 12. Raspberry PI Introduction
45. 01-What is Raspberry PI (1:28)
46. 02-Components of Raspberry PI (1:48)
Resources
Assessment Exercise- 12
Section 13. Raspberry PI Installation
47. 01-Installing OS on Micro SD Card (4:31)
48. 02-Overview of Raspbian (3:10)
49. 03-VNC View on Laptop (3:32)
50. 04-Installing Kali Tools on Raspberry PI (3:51)
Resources
Assessment Exercise- 13
Section 14. WPS Attack using Raspberry PI
51. 01-WPS Attack using Raspberry PI (6:36)
52. 01-WPA-WPA2 Wordlist_ Attack using Raspberry PI (4:48)
53. 01-How to Secure your Network (2:01)
Assessment Exercise- 14
Section 15. Final Exam
final exam
3. 02-Installing Virtual software and OS
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock