Hacking Wireless Networks. Theory and practice.

38% of secured Wi-Fi networks are vulnerable to the attack which can be carried out by a 12-year-old in 4 minutes! HOW?
3.1 (23 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
2,190 students enrolled
$19
$90
79% off
Take This Course
  • Lectures 62
  • Length 5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 6/2014 English

Course Description

LAST COURSE UPDATE: OCTOBER, 2016

Welcome to Hacking School!

Ethical Wireless Network Hacking Course:
Hacking Wireless Networks. Theory and practice.


Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.


This course covers all the important techniques related with WIRELESS NETWORK (or WiFi) HACKING used by hackers, system administrators and pentesters.


Wireless networks are all around us. You want it or not, you ARE part of this system. As new wireless encryption-standards are being developed, new attack techniques are being discovered and presented at the same time. It’s a real arms race.


Either you want to make your home WiFi network more secure, you want to recover a forgotten password, or you want to break into your wireless network to prove it is secure - regardless of the WiFi encryption-type used (WEP, WPA, WPA2), you will find the answer in this course.


What you can expect from this course:

  • You will get access to over 60 interesting lectures on Wireless Network Hacking
  • You can download the course Handbook in PDF (over 180 pages)
  • You can download the Training Operating System v2.0 CE (CUDA Extension) which is equipped with all the tools described in this course
  • It is a step by step training on WiFi ethical hacking
  • It covers over 25 different Wireless Network Hacking techniques and experiments
  • This course can be treated as a valuable source of knowledge by white- and blackhat hackers, pentesters and network analysts
  • You can get access to all the source codes and tools described in the course – it’s already prepared for you in the Training Operating System environment
  • You can boot the Training Operating System from CD/DVD or start it inside a virtual machine (using VirtualBox on Windows and VMware Fusion on MAC OSX)


What you need to know before you begin:

  • This ethical hacking course is intended to help you regardless of your current knowledge and skills. All you need is a basic computer knowledge and our Training Operating System v2.0 (you will also get access to it!).
  • We will show you how to prepare your training environment. In this environment you can experiment freely, without doing harm to anybody.
  • You will find all the source codes and examples inside your Training OS to avoid unnecessary code retyping.
  • Most of the modules (lessons) contain the attack related part, as well as a guidance to protect your own wireless network.
  • What you will find inside can also be used by beginners - thanks to live Video Training attached to the course.


The complete list of all the video training sessions included in this course:

  • The configuration of wireless network card modes
  • Changing the MAC address of the wireless network card
  • Finding a hidden access point with disabled ESSID broadcast
  • The use of deauthentication attack for jamming network traffic
  • The overview and demonstration of the chop-chop attack
  • Generating packets without knowing the network key
  • Interactive packet replay and ARP request replay
  • The demonstration of the PTW and KoreK attacks
  • Creating a fake access point – the Caffe Latte attack
  • The dictionary attack on WPA/WPA2
  • The dictionary attack on WPA/WPA2 – using hash tables
  • CUDA – the initial preparation of the environment
  • The installation of CUDA-SDK and CUDA-Toolkit
  • The compilation and installation of the tools with CUDA support
  • The optimization of the parameters of an nVidia video card
  • CUDA – preparation for the attack
  • CUDA – the attack on WPA/WPA2
  • Generating your own dictionary
  • Applications for cracking MD4 and MD5 hashes with the use of CUDA technology


Please be advised that all the techniques presented in this course can only be used ethically and in your own testing / researching environment. Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.


Good luck and see you on the other side,
Andrew Harper || Hacking School Team

What are the requirements?

  • interest in ITsec and ethical hacking
  • basic IT knowledge

What am I going to get from this course?

  • Lectures in PDF + Live Video Training
  • Free Training Operating System you can download
  • attacks on WEP
  • attacks on WPA
  • attacks on WPA2
  • preparation of rainbow tables
  • various Wi-Fi hacking techniques
  • securing a wireless network
  • Wi-Fi hacking essentials

What is the target audience?

  • students interested in wireless networks hacking
  • system / network administrators
  • geeks and wannabes
  • everyone interested in hacking in general
  • CEH, CISSP, MCSE, CCNA
  • ethical hackers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Download your Training Operating System v2.0 CE
Download the TOS v2.0 CE (CUDA Extension) ISO image
Article
Section 2: Download the whole course Handbook
Article

You can find the whole course Handbook in supplementary materials of this lecture.

(click on the download icon in the side menu)

Section 3: Course overview
Table of contents
4 pages
Legal information
12 pages
Section 4: Introduction to wireless networks
Introduction
2 pages
Wireless transmission standards
3 pages
802.11 wireless network types
2 pages
Encryption and authentication standards
3 pages
Wireless network cards in Linux - overview
2 pages
Wireless network interface cards in Linux
Preview
01:45
Section 5: Wireless security (half) measures: An overview
MAC address filtering
Preview
5 pages
Changing the MAC address of the wireless network card
Preview
04:24
Disabling ESSID broadcast
2 pages
Finding a hidden access point with disabled ESSID broadcast
Preview
04:13
Limiting wireless coverage
1 page
Section 6: Wireless network attacks independent of used encryption
Introduction
2 pages
DoS: RF jamming
2 pages
DoS: CSMA/CA jamming
1 page
The use of deauthentication attack for jamming network traffic
04:02
DoS: Deauthentication attack
2 pages
Wireless MITM
1 page
Section 7: WEP attacks
Section outline
1 page
WEP encryption
4 pages
Chopchop
4 pages
The overview and demonstration of the chop-chop attack
03:15
Keystream reuse
13 pages
Generating packets without knowing the network key
03:40
Interactive packet replay and ARP request replay
04:52
02:44

You can find some supplementary materials in download section.

Caffe Latte Attack
2 pages
Creating a fake access point – the Caffe Latte attack
02:07
Section 8: WPA attacks
Introduction
2 pages
WPA
5 pages
The dictionary attack on WPA
02:46
WPA2
5 pages
Rainbow tables
2 pages
The dictionary attack on WPA – using hash tables
Preview
02:10
Cowpatty attack
2 pages
DoS: Taking advantage of the MIC failure holdoff time
2 pages
Section 9: CUDA-powered attacks
What is CUDA?
2 pages
01:29

You can find some supplementary materials in download section.

The installation of CUDA-SDK and CUDA-Toolkit
02:40
The compilation and installation of the tools with CUDA support
05:34
The optimization of the parameters of an nVidia video card
03:56
CUDA – preparation for the attack
02:23
08:17

You can find some supplementary materials in download section.

Generating your own dictionary
02:13
04:28

You can find some supplementary materials in download section.

Wardriving experiment
3 pages
Section 10: Advanced attacks against WPA
WKA TKIP attack
10 pages
WPA TKIP broken
2 pages
Beck-Tews attack enhanced
4 pages
Michael Reset attack
1 page
Summary
1 page
Section 11: Summary
Summary
2 pages
Section 12: References
References
11 pages
Section 13: Free additions
IT SEC Beginner: Certified Hacking Training: Monitoring - What you will learn
00:47
IT SEC Beginner: Certified Hacking Training: Monitoring Transmitted Data
41:17
IT SEC Beginner: Certified Hacking Training: WiFi Security - What you will learn
00:47
IT SEC Beginner: Certified Hacking Training: WiFi Security - Overview and sol...
27:34
IT SEC Beginner: Certified Hacking Training: WiFi Security - Threats
18:35
Website Hacking in Practice Course: Module 13. SQL injection - Video Training
18:39

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Hacking School, IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

Instructor Biography

IT Security Academy, IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Ready to start learning?
Take This Course