Hacking WEP/WPA/WPA2 WiFi Networks Using Kali Linux 2.0
4.7 (63 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
635 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Hacking WEP/WPA/WPA2 WiFi Networks Using Kali Linux 2.0 to your Wishlist.

Add to Wishlist

Hacking WEP/WPA/WPA2 WiFi Networks Using Kali Linux 2.0

The Comprehensive course to Secure & Crack WEP/WPA/WPA2 key and perform MITM attack From scratch using Kali Linux 2.0
4.7 (63 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
635 students enrolled
Created by Saad Sarraj
Last updated 8/2017
English
Current price: $10 Original price: $100 Discount: 90% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 5 hours on-demand video
  • 2 Articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn Network Security Testing
  • Setup your Kali Linux environment properly
  • You will learn the basics of network
  • Gather any access point information without having the key
  • Carry out several attacks without having the key
  • Learn some Linux commands
  • You will be able to deal with a lot of Kali Linux tools
  • Crack any WiFi encryption using several methods
  • Protect your WiFi network against all the attacks
  • Learn ARP Poisoning
  • Launch ARP Poisoning attack
  • Launch (Man in the middle attack
  • Gain access to any client account in the WiFi network
  • Detect ARP Poisoning (MITM) attack to protect yourself against it
View Curriculum
Requirements
  • PC or Laptop
  • WiFi Card (supports injection)
  • Kali Linux Distribution
  • Basic IT skills
Description

Notice:

This Price is for the 1st 1000 students, so it will go up after that.

in this course, you will start as a beginner without any previous knowledge about the hacking, this course focuses on the practical side and the theoretical side.

 In this course you will learn how to set up your Kali Linux Environment properly without any issues, and we will learn on Kali Linux 2.0 which is the newest version of offensive security Organization, then you will learn how the Devices communicate with each other, then you will go through the theory behind each method during cracking WEP and WPA2 encryption because this will help you to understand what's happening in the real world, then you will move to learn how to crack WEP/WPA2 WiFi encryption key using more than method, so if the first method didn't  work with you, you can try another one, and after cracking WEP/WPA2 encryption key you will learn how to perform a sophisticated attacks against any client in the network and this is going to be the gravest and the funniest part of this course, after all of that you will learn how to protect yourself and your accounts from these attacks, and how to prevent your WiFi Access Point against any attack .

This course is intended for beginners and professionals, if you are a beginner you will start from zero until you become a professional, and if you are a professional so this course will increase your knowledge about the hacking.

This course is divided to six parts:

  1. Preparation: In this section, you will learn how to download and setup Kali Linux 2.0 properly as a virtual machine and also how to install it as your main OS, then you'll learn how to keep it always up to date, this will help you to create your safe Environment to do any kind of Penetration Testing.
  2. Network Basics: here you will learn the basics of networks that will help you to understand what's happening in the real world before you get into network security testing.
  3. Gather AP information Before Cracking: in this section you'll learn how you can Gather information about the target Access Point such as (ESSID-BSSID-Channel-Encryption type, etc......) before cracking the password because you can't hack anything without having as much as possible of information about the target, and you'll learn how you can disconnect any client from your target network or even jam your target AP completely without having the password.
  4. Cracking WEP/WPA/WPA2 Encryption:  After gathering information about the target Access Point now you'll move to learn how you to Crack WEP/WPA/WPA2 encryption key and the theory behind each method.
  5. MITM Attack: this is the gravest and the funniest section in this course because it includes a lot of funny things that you can do once you get access into the target AP such as (playing music in the target computer, stealing the passwords, and much more you can see it in the course...) and even fully control the connected devices.
  6. Protecting yourself against these attacks: after learning all of these attacks now it's time to learn how to protect yourself and your accounts against all of the previous attacks starting from cracking the WiFi AP key and ending with MITM Attacks, so you'll learn how to prevent yourself and your WiFi AP and your accounts from these attacks.

NOTICE: All the videos are downloadable.

My Recommendation is these WiFi Cards:

  • Realtek RTL8187L
  • TP-LINK TL-WN722N

Notes: 

  • these Attacks does work against any device such as (Tablets, Laptops, and Smartphones etc....)  and against any operating system (IOS, Android, Windows, Linux, Mac OS, etc....).
  •  You must practice what you learned to become an advanced level, because this course focuses on both practical and theoretical side. 
  • This course is going to be always up to date.
  • This course is only for Ethical purposes.
  • If you have any question or any problem, you can send a message to me and i'll be glad to response.
  • After finishing this course, you will get a certificate from Udemy.
  • All the people who enrolled in this course will get discounts for future courses.
  • All the Rights are Reserved to iSecurityPro no other Organization is involved.


Who is the target audience?
  • This course is for the people who want to do a Penetration Testing against a Specific WiFi Networks.
  • for the people who wants to protect themselves against these attacks.
Compare to Other Kali Linux Courses
Curriculum For This Course
64 Lectures
05:10:39
+
Introduction
1 Lecture 02:02
+
Preparation
6 Lectures 19:35

this video will show you how to install Kali Linux 2.0 as your main operating system properly without any issues.

Preview 06:10

this video will show you how to install Kali Linux 2.0 as a virtual machine properly without any problems.

Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)
04:52

After learning how to install kali Linux as a virtual machine on Virtualbox, in this video I will explain how to install it on VMware workstation.

Preview 02:37

You'll be able to setup your windows environment properly without any issues, because in the future videos we are going to use it in many scenarios as the victim computer.

Setup Windows as a Virtual Machine
02:52


this video will show you how you can update your Kali Linux 2.0 sources list and upgrade all the tools that is in Kali Linux using only one command.

Preview 01:35
+
Network Basics
3 Lectures 13:28

in this video you will learn the basics of networks that will help you to understand whats happening in the real world before you enter cracking WiFi encryption section.

Preview 02:36

in this video you will learn the mac address and how its works , and how you can spoof your mac address to bypass some hotels paid WiFi hotspot systems.

What is the Mac address? and how you can change it?
05:23

this video is going to show you how to enable monitor mode on your WiFi card using 2 methods , this allows you to capture any packet that is in your WiFi range .

Enabling monitor mode on the WiFi card
05:29
+
Gather AP information Before Cracking
6 Lectures 18:22

this video is only an introduction about gathering access point information this video is talks about what we are going to learn in the next videos.

Gather Acess Point information introduction
01:22

from this video you will be able to see all the available WiFi networks in your range , this will help you to specify your target .

Scanning for the available APs around us
02:42

you will learn from this video how you can specify you target network ,this will help you to gather information about your target network such as (BSSID,ESSID,channel....etc) ,and sniff the packets if your target network doesn't has encryption.

Preview 03:19

in this video you will learn how you can disconnect any client from any WiFi  network from your range even if you are not associated with the network , this will help you to get handshake file that we are going to use it when we will crack WPA/WPA2 key.

Disconnecting any device from any access point
03:34

this video will help you to discover all the hidden network in your WiFi range, and this is by using airodump-ng tool which is part of aircrack-ng suit.

Preview 02:44

in this video i will show you how you can jam any WiFi network that is in your range, and this will disconnect all the clients in your target network and no one will be able to connect to your target network ,and i will explain two methods using two different tools (aireplay-ng & Websploit).

Jamming any WiFi access point
04:41
+
Cracking WEP Encryption
8 Lectures 47:13

this video is an overview about what we are going to learn in the next videos.

introduction
01:31

this video is talking about how WEP encryption works, and the weakness in WEP encryption ,and the theory behind cracking WEP encryption.

Cracking WEP encryption explain
02:16

In this video i am going to talk about the methods that we are going to use in the next videos to crack WEP encryption key.

Preview 01:39

in this video i am going to show you a demonstration about what's happening in the real world when you want to crack WEP encryption , so first we will specify our target then capture a huge number of data packets ,then use aircrack-ng to do a statistical attack and determine the WEP key by capturing two packets has the same IV.

Cracking WEP encryption demo
06:44

you will learn from this video how you can fake authenticate you WiFi card with any WiFi Access point that has WEP encryption ,because this will help you to inject a new packets into the traffic and this will Shortens the time of the attack a lot.

Fake authentication with the target network
04:24

the first method we are going to apply is Korek Chopchop attack

this method depend on capturing an ARP packets from the network ,then we will forge it to a new packets then we will inject it into the traffic and this will increase the number of data packets rapidly ,then aircrack-ng will do a statistical attack to determine the key.

Cracking WEP using Korek Chopchop Attack
12:59

in this video i am gonna show you the best and the quicker method that will help you to crack the password , because this method depends on capturing an ARP packets then inject it again into the traffic , because this leads to increase the number of data packets rapidly, then we will use aircrack-ng to crack the password by using a statistical attack to determine the key.

Cracking WEP using ARP Request Replay Attack
07:15

you will be able to crack WEP encryption key using Hirte attack method ,

Hirte is a type of attack that aims to crack the WEP key of wireless networks that are not reachable but the client device is in the area of the attacker.

Cracking WEP using Hirte Attack
10:25
+
Cracking WPA/WPA2 Encryptions
11 Lectures 58:20

in this video i am talking about how the WPA and WPA2 encryption works , because understanding the algorithm helps you to know whats happening in the real world.

Preview 01:12

this video is talks about the method that we can apply on our target network to crack the password 

there is more than method that could help you to achieve you goal and get the password.

Cracking WPA/WPA2 encryption methods
01:40

in this video you will learn how to crack WPA2 key without using a word list , this done by brute forcing the PIN number of the target router , once we done from that Reaver tool will reverse engineer it and get the actual key.

Cracking WPA/WPA2 using WPS feature
06:38

Before we crack WPA2 key we shall learn how to capture the handshake , this done by disconnect any client from the network and let him connect again.

Capturing the Handshake
04:20

In this video you will learn how to create your own wordlist to bruteforce the target AP to get the key , this is by using crunch tool.

Creating a Wordlist
05:55

After creating your wordlist in this tutorial you will learn how to crack WPA/WPA2  encryption key using your wordlist , this done by comparing the PMK with the handshake.

Cracking WPA/WPA2 using dictionary attack
05:17

in this video you don't have to create a wordlist , because you will use crunch tool and aircrack-ng tool at the same time , so crunch will generate the passwords then aircrack-ng will compare the each password with the PMK.

Cracking WPA/WPA2 using bruteforce attack
06:07

in this video you will be able to crack WPA2 key and this is by using Rainbow table method , this method depends by combining the ESSID and the password list and convert it to PMK , so you don't have to wait for each password to be converted to PMK and compare it with the handshake , it will compare all the passwords that are in the wordlist with the handshake.

Cracking WPA/WPA2 using Rainbow Table
05:39

in the previous videos we were using the CPU to guess the AP password, but this time we will use the GPU instead of the CPU because your GPU is more powerful than your CPU , we will do that using Hashcat.

Cracking WPA/WPA2 using Hashcat (GPU)
05:25

this is the most powerful method, because you will jam your target AP and broadcast a fake AP has the exact same information of the target AP, then he will be forced to connect to your fake AP , then a security recommendation page will popup and ask him for the password, then he will be forced to enter the key, then you will get the password.

Cracking WPA/WPA2 using Evil Twin attack
11:35

In this video you will be able to get the username and the password of your target router, this done by using Routersploit tool that's contain a number exploits.

Getting the username and the password of the target router
04:32
+
Man in the Middle Attacks
16 Lectures 01:26:56

this video is only an introduction about MITM attack.

Preview 01:12

In this video you'll be able to discover the connected clients and their IP & mac addresses, this is by using Netdiscover tool.

Gathering information about the connected clients
02:59

in this video you'll be able to gather a detailed information about the connected clients, because this will help you to specify your target.

Gather detailed information about the clients
07:10

Before we get started into MITM attack we shall learn what is MITM attack, and the theory behind this attack.

Man in the middle attack explain
03:40

In this video you'll be able to poison the ARP table, in the target device and this is by telling the router that i am the client and telling the client that i am the router.

MITM attack using (arpspoof)
07:24

In this video you'll be able to capture any login information from any client such as the Email and the Password, this is by using MITMF.

Capturing login credentials
05:23

In this video you'll be able to bypass SSL certificate issue, because some websites such as Gmail Yahoo Microsoft are uses SSL certificate, that's mean you cannot capture the login information because it's encrypted, but in this video you'll learn how to downgrade the connection from HTTPS to HTTP in order to bypass this issue.

Bypassing SSL Certificate
06:38

in this video you'll learn how to redirect any client from any website to another, so you can redirect the target to a page could have a malicious backdoor into it, or you can redirect the client from the trusted website to a fake page has the exact same interface, so you'll bypass SSL issue and HSTS.

Redirect any client from to any website
06:32

in this video you'll be able to bypass remember me issue, because if the target uses remember me option that's mean he will be redirected to the meant website without having to enter the key, so in this video you'll learn how to steal the cookies from the target browser and inject it into your browser, then you'll be redirected to the target account without entering the email & password.

Stealing the Cookies
07:02

in this video you'll be able to capture a screenshot from the target browser so you will see what he is watching, chatting, browsing and more....

Capture a screenshot from the target browser
04:12

In this video you'll be able to inject a keylogger into the target browser, so you will be able to see what the target is typing, or his conversations

Injecting a keylogger into the target webpage
04:49

in this video you'll be able to capture all the images from the target browser and this is by using Driftnet tool.

Capturing images from the network traffic
03:35

In this video you'll be able to inject any HTML code or file into the target browser, and you'll be able to flip all the images 180 degrees in the target browser.

Injecting html file and flip the images in the target browser
06:48

In this video you'll be able to inject any JavaScript file or code into the target browser, and how to Hook the clients with BeEF project.

Injecting JavaScript URL and Hooking the client’s with BeEF
06:58

in this video you'll be able to steal the target social network accounts such as (Facebook,Google,Yahoo,etc…..) and this is by showing the target a fake login prompt asks him to renew his session.

Stealing the Target accounts with BeEF
03:45

this video is only for entertainment, because you'll be able to run some funny commands in the target browser.

Having Fun with BeEF
08:49
+
Fully accessing the connected devices
5 Lectures 26:45

in this  video you'll be able to create undetectable backdoor by using Veil-evasion tool, because if the target computer uses an Antivirus it will detect your backdoor and prevent it from executing.

Creating an encrypted Backdoor
04:47

in this video you will be able to run your encrypted backdoor into the target computer,but before we do that we shall learn how to listen for incoming connection.

Testing the Backdoor in the target device
04:29

In this video you will be able to force your target to run your backdoor, this done by showing the target a fake update, once he install it and run it he will be Hacked.

Creating a Fake browser Update & and Hack any client
04:49

In this video you'll learn how to interact with the target computer through Meterpreter command line, in this part i focused on the most useful commands to interact with the target machine.

Interacting with the Target Computer (Part 1)
06:29

In the second part you'll learn the most enjoyable commands that you can use in the target computer.

Interacting with the Target Computer (Part 2)
06:11
+
Protect your WiFi AP and yourself against all the previous attacks
5 Lectures 28:39

after learning all of these attacks that could be launched against your WiFi AP, now it's time to learn how to prevent yourself against all of the previous attacks.

Protect your WiFi access point
07:39

in this video you will be able to detect any MITM attack and this is by using XARP program that's tells you if somebody trying to poison your ARP table.

Detect ARP Poisoning attack using (XARP)
03:21

after watching you will be able to detect any ARP poisoning attack and detect if anybody trying to scan your network, this done by analyzing the network traffic.

Detect ARP Poisoning attack (Wireshark)
05:34

after learning how to detect any ARP poisoning attack, in this video you'll be able to prevent your ARP table from modifying, this done by changing the mac address table from dynamic to static.

Prevent your ARP table from poisoning
05:51

you'll be able to detect any Meterpreter session on your windows memory and kill it, this done by scanning the running services and processes on your windows memory, and also you’ll be able to detect the encrypted backdoor.


Detect and Kill any Meterpreter Session
06:14
+
Extras
1 Lecture 06:55

In this video you'll be able to disconnect any paired Bluetooth device, so first we are going to scan for the nearby Bluetooth devices, then we will send a large number of packets to the target device.

Disconnecting paired Bluetooth devices
06:55
2 More Sections
About the Instructor
Saad Sarraj
4.7 Average rating
90 Reviews
837 Students
3 Courses
Ethical Hacker, IT Expert

My Name is Saad Sarraj , i am a young Ethical Hacker who is trying to keep the things secure.I have a very good Experience in penetration testing and Ethical Hacking, i started in this field since 2012 , then i have created my own website (iSecurityPro) and started making videos on my YouTube channel which includes many tips and tricks about Linux OS and Windows OS , i am always focusing on the practical side in producing videos and also the theory behind every single attack , and  i am trying to share my experience with you from what i learned before .