Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 4 hours on-demand video
  • 35 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Wireless Security

WiFi Hacking: Wireless Penetration and Security MasterClass

Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.
Rating: 4.3 out of 54.3 (55 ratings)
806 students
Created by Arsalan Saleem, Secure Techware
Last updated 1/2021
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Basics of wireless how wireless works
  • Advance wireless concepts
  • Scan all networks & devices within wireless range
  • Understand WEP Protocol and its weakness
  • Understand how we can exploit WEP Protocol
  • Understand WPS Protocol and its weakness
  • Learn how to hack WPS enabled networks
  • Understand WPA/WPA2 Protocol and its weakness
  • Learn how 4-way handshake works
  • Learn how to crack WPA/WPA2 Personal using dictionary attack
  • Learn about Evil Twin Attack on WPA/WPA2 Personal
  • Understand how Captive Portal works
  • Learn how to hack Captive Portals
  • Understand WPA2 Enterprise Protocol
  • Learn how to hack WPA2 Enterprise network
  • Learn advance hacking scenarios
  • Learn how to create hacking hardware using Raspberry PI
  • Learn Basics of Raspberry PI
  • Learn how WPS attack works using Raspberry PI
  • Understand how WPA/WPA2 attack works using Raspberry PI
  • Learn how you can secure your network

Requirements

  • Basic Computer Skills
  • Wireless Adapter (Look Wireless Basic Section for details)
  • Kali Linux
  • Raspberry PI (Recommended NOT Required)

Description

In this course we are going to learn about each and every aspect of wireless networks what is a wireless network? How it works? What are the weakness of wireless network? We have setup this course in a way in which you can understand the core concept of wireless. We will start each section by understanding how different Protocol works so you will have complete understanding of each Protocol and you don’t become script kiddies. We will start with very basic how wireless network works we will learn about different Bands, Channels and Frequencies. We will also learn about different wireless adapters and different modes of wireless adapter like monitor mode and managed mode after that we will dive into more advanced concepts like Packet sniffing and Target sniffing. We will also look the difference between 2.4GHz & 5GHz frequencies and packet sniffing on 5GHz network. Then we will look into how to discover Hidden Networks. After that we will see how to maximize the power of wireless adapter.  Then we will try to understand WEP (Wired Equivalent Privacy) Protocol and see its weakness. After that we will try to pentest WEP based network. After doing that we will learn about WPS (Wi-Fi Protected Setup) and how we can hack into this protocol. Then we will learn and understand about the most secure protocol WPA/WPA2 Personal and see how this protocol works and why it's so much secure we also try and understand about 4-way handshake. Then we will pentest WPA/WPA2 Personal network as well and see how we can hack these types of networks using Dictionary Attack. After that we will try to pentest WPA/WPA2 with Evil Twin Attacks. Then we will see how Captive Portals work. Nowadays Captive Portals are used in Hotels, Coffee shops and Malls etc. We will also see how we hack networks which are based on Captive Portals. Then we will look into WPA2 Enterprise networks and first try to understand its protocol then we will pentest WPA2 Enterprise network and see how we can get access to these networks.

After understanding all Protocols and their weakness we will look some special hacking scenarios and to solve those scenarios we will create a hacking hardware with Raspberry PI. If you don't know anything about Raspberry PI don’t worry we are going to explain each and every thing about it. Starting from what Raspberry PI is? How we can use it in penetration testing what tools and software we going to install on it. We are going to cover all these in a separate section in this course. After getting good understanding of Raspberry PI we will use it in penetration testing WPS enabled networks. After that we will use Raspberry PI in WPA/WPA2 penetration testing. After covering all the aspects of wireless hacking we will see how we can overcome all the weakness in each of the protocol and see how we can make wireless networks more secure.

Who this course is for:

  • People interested about learning how hackers think ?
  • People interested about learning how to hack different types of wireless networks.
  • People interested in learning about core wireless concepts.

Course content

18 sections • 54 lectures • 3h 58m total length

  • Preview01:44

  • Preview05:00
  • 02-Installing Virtual software and OS
    04:37
  • 03-Setup OS in VMware
    02:19
  • 04-First look of Kali Linux
    03:29
  • 05-Creating Snapshots
    05:30

  • Preview05:02
  • 02-Wifi-Adapter
    02:10
  • 03-Wifi-Adapter Modes
    06:14
  • 04-Wlan Frequencies Bands and Channels
    07:19
  • 05-MAC Address
    06:45
  • 06-Beacon Frames
    06:54

  • 01-Packet Sniffing Basics
    03:11
  • 02-Target Sniffing
    02:03
  • 03-Packet Sniffing on 5GHz Network
    06:15
  • 04-Deauthentication Attack
    05:28
  • 05-Discovering Hidden SSIDs
    02:02
  • 06-MAC Address Verification
    08:20
  • 07-Maximize the power of WiFi Adapter
    04:46

  • 01-WEP Protocol
    06:23
  • 02-WEP Attack Basics
    05:05
  • 03-WEP Attack No Clients
    08:47

  • 01-What is WPS
    02:50
  • 02-WPS Attack
    04:47
  • 03-Unlock WPS
    08:40

  • 01-WPA-WPA2-Protocol
    09:56
  • 02-Cracking WPA-WPA2-Protocol
    03:44

  • 01-WPA-WPA2-WordList-Attack
    05:38
  • 02-WPA-WPA2-WordList-Attack-Part-2
    02:35
  • 03-Saving-Dictionary-Progress
    07:36
  • 04-Speedup-Cracking-Using-Rainbow-Tables
    06:03

  • 01-Evil-Twin-Theory
    Processing..
  • 02-Evil-Twin-Installation
    03:20
  • 03-Evil-Twin-Attack
    08:12

  • 01-What is Captive Portal
    02:18
  • 02-What is MitM
    05:51
  • 03- Captive Portal MitM Attack
    05:23

Instructors

Arsalan Saleem
Software Developer and Security Expert
Arsalan Saleem
  • 4.4 Instructor Rating
  • 919 Reviews
  • 10,342 Students
  • 9 Courses

I'm a Security Expert and Software Developer with 7+ years experience. I love to work on innovative offensive security ideas. I have developed many web application and mobile applications. I have also worked on security of many industrial software's. Currently I'm working on exploit research and use of deep learning with micro controllers in Penetration Testing.   

Secure Techware
Innovate Your Business
Secure Techware
  • 4.4 Instructor Rating
  • 919 Reviews
  • 10,342 Students
  • 9 Courses

SecureTechware believes in the philosophy of innovation for serving the employees, clients and the community effectively. We believe in quality and reliability in order to deliver superior services. Whether it is new development, update or maintenance; our company has a potential to provide the best!

Our vision is to be the innovation leader in the I.T. services. We are determined to have a company culture which is based on quality performance, respect and teamwork. We are a blend of passion and superior skills which helps us to accelerate our success. Our professional and quality services provide clients with competitive edge and success in the marketplace.

Our top priority is client satisfaction. We keep on exploring innovative ideas for our clients in order to provide them with utmost satisfaction. We keep a friendly environment in our dealings with the clients. We are thrived to be the finest solution provider for you!

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.