Kali Linux wireless network penetration testing course will help you learn how to make wireless networks more secure. In this course we will be in the role of the attacker, and use different attack tools and techniques, to breach security measures of WLAN. Learn basic and advance protection mechanisms, and how to conduct attacks on them.
Basic info on penetration testing and Kali linux operating system.
In this video we will download and install vmware/virtualbox(depending on your choice), and set Kali linux on vmware. We will also look into hashes and learn how hash checking works.
In this video we will install virtualbox extension pack and set Kali configurations to use it with Virtualbox.
Setting the work environment. Wireless access point and working interface of Kali.
Information about wireless networks in general. Advantages, disadvantages, different sorts and technologies.
Putting usb wireless card in monitor mode
Fire up wireshark and sniff first data over network. Faster and easier use of wireshark with filters is adressed.
First injection test using aireplay and wireshark
Different settings and configurations of usb wireless card. Channel, power changing, regulatory settings
Setting and bypassing Hidden SSID authentication mechanism.
Setting and bypassing MAC filtering authentication mechanism.
Summary of section two.
Basic information about cryptography. Cryptographic algoritms and wireless cryptography mechanisms.
What it is, and how WEP works. What are its weaknesses and setting WEP on access point.
Step by step of cracking WEP.
Caffe latte and Hirte attacks on users of WEP network. Cracking WEP through client.
What it is, and how WPA works. What are its weaknesses and setting WPA on access point.
Brute force attack using hashcat tool.
Decryption of captured packets(WEP and WPA) using cracked keys.
Summary of section three.
Exploiting flaw of certain routers with WPS protection enebled. What WPS is, and how to crack it with Reaver brute forcing.
Cracking WPS, on certain routers using combination of mdk3 flood attack and reaver. Simplified with ReVdK3 script too which is provided as resource.
Conduction various DoS attacks with aireplay-ng and mdk3.
Attacks on web forms, particularly on admin control panel of wireless networks. Dictionary attack with Hydra.
Creating evil twin access point. Fake access point, that replicates legitimate access point of the network. Starting point for many dangerous attacks on users of network, such as man-in-the-middle attacks.
Creating rogue access point. Malicious fake access point that functions as starting point for many dangerous attacks on users of network, such as man-in-the-middle attacks.
Summary of section four.
Conducting MITM attack with rogue access point. Eavesdropping on traffic as MITM.
MITM session hijack with dns spoofing and phishing techniques.
Conducting Man-in-the-middle attacks with Ettercap tool.
Conducting Man-in-the-middle attacks with Bettercap tool.
WPA-Enterpraise. More advanced method of WPA encryption for WLAN. Mostly used by companies and big wireless networks. Theory behind it, and setting up
Step by step cracking of WPA-Enterpraise
Quick summary of section five.
Conclusion of what was done in this course. Protection of technical and social aspect of networks. Protecting from even most advanced attacks is possible, but absolute protection never is. Tips and tricks for more protection is given and some closing words.
Manual installation of Kali linux
Tips and tricks of how to find and set up wifi drivers on Kali.
Changing desktop environment for Kali linux. Sometimes vmware can keep buging with new versions of Kali on default desktop environment, Changing it solves that problem.
IT Engineer with many successful projects behind him. Security, and Linux enthusiast. Programmer with knowledge in C , C#, Java, SQL, PHP, CSS, HTML, XML, UML. Constantly improving knowledge in IT sector. Some of the projects I worked on: Complete security testing of WLAN for individuals and bussineses, cattering service (Java, JSP), Online Pet Shop - complete softver development(C#, ADO.NET, UML, SQL), Bus station, bookstore and others software solutions. Currently improving Linux administration skills.