Companies Home Search Profile

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

Focused View

Zaid Sabih,z Security

5:57:18

47 View
  • 001 01-Intro.pdf
  • 001 Introduction.mp4
    03:25
  • 001 Lab Overview And Needed Software.mp4
    05:54
  • 002 Initial Preparation.mp4
    09:28
  • 003 Installing Kali Linux as a VM on Windows.mp4
    08:55
  • 004 Installing Kali Linux as a VM on Apple Mac OS.mp4
    11:10
  • 005 Installing Kali Linux as a VM on Linux.mp4
    10:46
  • 006 Basic Overview Of Kali Linux.mp4
    05:10
  • 007 Linux Terminal And Basic Commands.mp4
    13:06
  • external-links.txt
  • 001 Networks Basics.mp4
    04:28
  • 002 Connecting a Wireless Adapter To Kali.mp4
    06:13
  • 003 What is MAC Address And How To Change It.mp4
    08:20
  • 004 Wireless Modes - Managed And Monitor Mode Explained.mp4
    06:57
  • 005 Sniffing Basics - Using Airodump-ng.mp4
    06:40
  • 006 WiFi Bands - 2.4Ghz And 5Ghz Frequencies.mp4
    07:54
  • 007 Targeted Sniffing Using Airodump-ng.mp4
    10:30
  • 008 Deauthentication Attack (Disconnecting Any Device From The Network).mp4
    08:10
  • 009 Discovering Hidden Networks.mp4
    08:12
  • 010 Connecting To Hidden Networks.mp4
    05:14
  • 011 Bypassing Mac Filtering (Blacklists And Whitelists).mp4
    09:04
  • external-links.txt
  • 001 Cracking Sections Introduction.mp4
    01:09
  • 002 03-WEP-Cracking.pdf
  • 002 Theory Behind Cracking WEP.mp4
    05:47
  • 003 WEP Cracking - Basic Case.mp4
    06:17
  • 004 Associating With Target Network Using Fake Authentication Attack.mp4
    06:45
  • 005 ARP Request Reply Attack.mp4
    06:09
  • 006 Chopchop Attack.mp4
    08:28
  • 007 Fragmentation Attack.mp4
    07:44
  • 008 Cracking SKA Networks.mp4
    09:05
  • 001 WPA Cracking - Introduction.mp4
    03:42
  • 001 WPA Cracking - Exploiting WPS Feature.mp4
    08:16
  • 002 Bypassing Failed to associate Issue.mp4
    07:40
  • 003 Bypassing 0x3 And 0x4 Errors.mp4
    07:39
  • 004 WPS Lock - What Is It And How To Bypass it.mp4
    07:02
  • 005 Unlocking WPS.mp4
    08:41
  • 001 How To Capture The Handshake.mp4
    06:49
  • 002 Creating a Wordlist.mp4
    07:33
  • 002 Some-Links-To-Wordlists-1.txt
  • 003 Cracking Key Using A Wordlist Attack.mp4
    06:26
  • 004 Saving Cracking Progress.mp4
    09:44
  • 005 Using Huge Wordlists With Aircrack-ng Without Wasting Storage.mp4
    07:35
  • 006 Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage.mp4
    10:05
  • 007 Speeding the Cracking Process Using Rainbow Tables.mp4
    07:01
  • 008 Cracking WPAWPA2 Much Faster Using GPU - Part 1.mp4
    07:20
  • 009 Cracking WPAWPA2 Much Faster Using GPU - Part 2.mp4
    10:39
  • 001 What is WPAWPA2 Enterprise And How it Works.mp4
    05:25
  • 002 How To Hack WPAWPA2 Enterprise.mp4
    06:48
  • 003 Stealing Login Credentials.mp4
    08:11
  • 004 Cracking Login Credentials.mp4
    06:38
  • 001 Securing Systems From The Above Attacks.mp4
    04:59
  • 002 How to Configure Wireless Security Settings To Secure Your Network.mp4
    08:05
  • 001 Bonus Lecture - Discounts.html
  • Description


    46+ Videos to teach you how to hack and secure Wi-Fi (WEP, WPA, WPA2, WPA/WPA2 Enterprise)

    What You'll Learn?


    • Learn the main weaknesses of WEP encryption and how it can be cracked
    • Understand a number of techniques to crack WEP,WPA & WPA2
    • Gain access to WPA2 Enterprise networks.
    • Hack captive portals (eg: hotel and airport networks).
    • Use the GPU for faster cracking
    • Have a good understanding of how networks operate
    • Understand how devices communicate with each other in a netowrk
    • Launch chopchop reply attack to crack WEP encryption
    • Discover wireless networks within range
    • Gather information about wifi networks
    • Discover connected devices to each wifi network within range
    • Disconnect any device from any network within range
    • Launch interactive packet reply attack to crack WEP encryption
    • Launch fragmentation attack to crack WEP encryption
    • Learn WPA/WPA2 weakness and the theory behind cracking it
    • Exploit WPS feature to crack WPA/WPA2 without a wordlist and without the need to any connected clients
    • Capture handshake and launch word list attack
    • Create your own wordlist
    • Launch a wordlist attack using the GPU
    • Launch a word list attack using a rainbow table
    • How to protect wireless networks from cracking attacks
    • Spot weaknesses in wireless networks in order to protect your network
    • Configure wireless networks to protect against the discussed attacks

    Who is this for?


  • People interested in learning how to test the security of WiFi keys/passwords
  • What You Need to Know?


  • Basic IT skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory
  • Operating System: Windows / OS X / Linux
  • Wireless adapter like ALFA AWUS036NHA or anything with an Atheros chip (more info provided in the course)
  • More details


    Description

    Welcome to my WiFi cracking course where you'll learn how to crack the key and get the password to WiFi networks weather they use WEP, WPA or even WPA2, not only that but you'll also learn how to secure networks from hackers.

    This course is highly practical but won't neglect the theory, you will start as a beginner with no prior knowledge about hacking, and it will take you through the basics of networking and how clients communicate with each other, how the different types of WiFi encryptions work, then you'll learn how to use this information to exploit these networks and crack their encryption.

    The course is divided into four main sections: 

    1. Networks Basics: in this section you will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode  and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn a number of attacks that you can launch without the need to know the password such as controlling all the connections around you (ie: deny/allow any device from connecting to any network),  you will also learn how to overcome some security features that would prevent you from even trying any attacks, you will learn how to discover and target hidden networks and bypass mac filtering weather it is implemented using a black-list or a white-list. .
       

    2. WEP Cracking: Now that you have gathered information about all the networks around you, and found your target, you will learn how to crack the key that the target uses. In this section you will learn four methods to crack WEP encryption. First you will learn the weaknesses in WEP that allow us to crack it, then you will learn the theory behind each method and finally you will learn how to launch that attack against WEP networks and obtain the key, in this section you will learn 4 different methods to crack WEP to make sure that you can crack any WEP network you face regardless of how its configured.

    3. WPA Cracking: in this section you will learn  a number of methods to crack WPA/WPA2 networks, again you will learn the weakness in WPA and theory behind each method first, and then you will learn how to launch the attack against a real network, this section is divided into a number of smaller sections:

      1. Exploiting WPS - In this subsection you will learn how to exploit the WPS feature to gain access to WPA/WPA2 networks without using a wordlist, not only that but you'll also learn how to debug reaver's output and exploit the WPS feature on more routers using reaver's advanced options, you will also learn how to unlock some routers if they lock after a number of failed attempts.

      2. Wordlist Attacks - in this subsection you will learn how to run wordlist attacks to crack the WPA/WPA2 key, you will learn how to use huge wordlists without wasting storage, save the cracking progress so that you can pause and resume the cracking process whenever you want, and you will also learn how to crack the key much faster using the GPU instead of the CPU.

      1. WPA/WPA2 Enterprise - These networks are usually used in companies and colleges, these are secure networks that use WPA/WPA2 but also require users to login with a username and password after connecting, in this subsection you will understand how they work and how to gain access to them.

    4. Protection: At this stage you will know the weaknesses and methods that real life hackers use, therefore it will be very easy for you to secure your network against these attacks. In this section you will learn how to configure your wireless networks so that the above attacks will not work, you will learn what settings need to be changed, how to access the router settings and how to change these settings.


    All the attacks in this course are practical attacks that work against real wireless networks in my lab

    With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.


    NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED. 

    Who this course is for:

    • People interested in learning how to test the security of WiFi keys/passwords

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CEO of zSecurity & Bug-Bounty. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. I have tremendous experience in ethical hacking and cyber security and I have over 1M students world wide on multiple teaching platforms.
    zSecurity is a leading provider of ethical hacking and cyber security training, we teach hacking and security to help people become ethical hackers so they can test and secure systems from black-hat hackers.  Becoming an ethical hacker is simple but not easy, there are many resources online but lots of them are wrong and outdated, not only that but it is hard to stay up to date even if you already have a background in cyber security.  Our goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these hackers.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 48
    • duration 5:57:18
    • English subtitles has
    • Release Date 2023/08/24

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Penetration Testing

    Courses related to Network Security

    Subtitle
    CCIE Security Bootcamp
    INECCIE Security Bootcamp
    29:33:28
    English subtitles
    08/07/2023

    Courses related to Information Security

    Courses related to Computer Network

    Courses related to IT Networking Fundamentals

    Subtitle
    Learning IPv6
    Linkedin Learning Jarrel Rivera
    Jarrel Rivera
    Learning IPv6
    47:48
    English subtitles
    12/05/2023
    IKEv1 IPsec VPN
    INEIKEv1 IPsec VPN
    2:30:09
    08/13/2023

    Courses related to Network Engineering

    Courses related to Wireless Networking