WiFi Hacking: Wireless Penetration and Security MasterClass
4.2 (42 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
723 students enrolled

WiFi Hacking: Wireless Penetration and Security MasterClass

Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.
4.2 (42 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
723 students enrolled
Last updated 5/2020
English
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4 hours on-demand video
  • 35 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Basics of wireless how wireless works
  • Advance wireless concepts
  • Scan all networks & devices within wireless range
  • Understand WEP Protocol and its weakness
  • Understand how we can exploit WEP Protocol
  • Understand WPS Protocol and its weakness
  • Learn how to hack WPS enabled networks
  • Understand WPA/WPA2 Protocol and its weakness
  • Learn how 4-way handshake works
  • Learn how to crack WPA/WPA2 Personal using dictionary attack
  • Learn about Evil Twin Attack on WPA/WPA2 Personal
  • Understand how Captive Portal works
  • Learn how to hack Captive Portals
  • Understand WPA2 Enterprise Protocol
  • Learn how to hack WPA2 Enterprise network
  • Learn advance hacking scenarios
  • Learn how to create hacking hardware using Raspberry PI
  • Learn Basics of Raspberry PI
  • Learn how WPS attack works using Raspberry PI
  • Understand how WPA/WPA2 attack works using Raspberry PI
  • Learn how you can secure your network
Requirements
  • Basic Computer Skills
  • Wireless Adapter (Look Wireless Basic Section for details)
  • Kali Linux
  • Raspberry PI (Recommended NOT Required)
Description

In this course we are going to learn about each and every aspect of wireless networks what is a wireless network? How it works? What are the weakness of wireless network? We have setup this course in a way in which you can understand the core concept of wireless. We will start each section by understanding how different Protocol works so you will have complete understanding of each Protocol and you don’t become script kiddies. We will start with very basic how wireless network works we will learn about different Bands, Channels and Frequencies. We will also learn about different wireless adapters and different modes of wireless adapter like monitor mode and managed mode after that we will dive into more advanced concepts like Packet sniffing and Target sniffing. We will also look the difference between 2.4GHz & 5GHz frequencies and packet sniffing on 5GHz network. Then we will look into how to discover Hidden Networks. After that we will see how to maximize the power of wireless adapter.  Then we will try to understand WEP (Wired Equivalent Privacy) Protocol and see its weakness. After that we will try to pentest WEP based network. After doing that we will learn about WPS (Wi-Fi Protected Setup) and how we can hack into this protocol. Then we will learn and understand about the most secure protocol WPA/WPA2 Personal and see how this protocol works and why it's so much secure we also try and understand about 4-way handshake. Then we will pentest WPA/WPA2 Personal network as well and see how we can hack these types of networks using Dictionary Attack. After that we will try to pentest WPA/WPA2 with Evil Twin Attacks. Then we will see how Captive Portals work. Nowadays Captive Portals are used in Hotels, Coffee shops and Malls etc. We will also see how we hack networks which are based on Captive Portals. Then we will look into WPA2 Enterprise networks and first try to understand its protocol then we will pentest WPA2 Enterprise network and see how we can get access to these networks.

After understanding all Protocols and their weakness we will look some special hacking scenarios and to solve those scenarios we will create a hacking hardware with Raspberry PI. If you don't know anything about Raspberry PI don’t worry we are going to explain each and every thing about it. Starting from what Raspberry PI is? How we can use it in penetration testing what tools and software we going to install on it. We are going to cover all these in a separate section in this course. After getting good understanding of Raspberry PI we will use it in penetration testing WPS enabled networks. After that we will use Raspberry PI in WPA/WPA2 penetration testing. After covering all the aspects of wireless hacking we will see how we can overcome all the weakness in each of the protocol and see how we can make wireless networks more secure.

Who this course is for:
  • People interested about learning how hackers think ?
  • People interested about learning how to hack different types of wireless networks.
  • People interested in learning about core wireless concepts.
Course content
Expand all 54 lectures 03:58:23
+ 01-Setting Up The Lab Environment
5 lectures 20:55
02-Installing Virtual software and OS
04:37
03-Setup OS in VMware
02:19
04-First look of Kali Linux
03:29
05-Creating Snapshots
05:30
+ 02-Wireless Basics
6 lectures 34:24
02-Wifi-Adapter
02:10
03-Wifi-Adapter Modes
06:14
04-Wlan Frequencies Bands and Channels
07:19
05-MAC Address
06:45
06-Beacon Frames
06:54
+ 03-Wireless Advanced Concepts
7 lectures 32:05
01-Packet Sniffing Basics
03:11
02-Target Sniffing
02:03
03-Packet Sniffing on 5GHz Network
06:15
04-Deauthentication Attack
05:28
05-Discovering Hidden SSIDs
02:02
06-MAC Address Verification
08:20
07-Maximize the power of WiFi Adapter
04:46
+ 04-WEP Protocol and Attack
3 lectures 20:15
01-WEP Protocol
06:23
02-WEP Attack Basics
05:05
03-WEP Attack No Clients
08:47
+ 05-WPS Attack
3 lectures 16:17
01-What is WPS
02:50
02-WPS Attack
04:47
03-Unlock WPS
08:40
+ 06-WPA-WPA2 Protocol
2 lectures 13:40
01-WPA-WPA2-Protocol
09:56
02-Cracking WPA-WPA2-Protocol
03:44
+ 07-WPA-WPA2 Word List Attack
4 lectures 21:52
01-WPA-WPA2-WordList-Attack
05:38
02-WPA-WPA2-WordList-Attack-Part-2
02:35
03-Saving-Dictionary-Progress
07:36
04-Speedup-Cracking-Using-Rainbow-Tables
06:03
+ 08-WPA-WPA2 Evil Twin Attack
3 lectures 11:32
01-Evil-Twin-Theory
Processing..
02-Evil-Twin-Installation
03:20
03-Evil-Twin-Attack
08:12
+ 09-WPA-WPA2 CAPTIVE PORTALS Attack
3 lectures 13:32
01-What is Captive Portal
02:18
02-What is MitM
05:51
03- Captive Portal MitM Attack
05:23