Kali Linux wireless network penetration testing
4.2 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
43 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kali Linux wireless network penetration testing to your Wishlist.

Add to Wishlist

Kali Linux wireless network penetration testing

Kali Linux wireless network pentesting: Learn how to secure networks from basic attacks to most advanced ones.
4.2 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
43 students enrolled
Created by Aleksa Djokovic
Last updated 3/2017
Current price: $10 Original price: $35 Discount: 71% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 5 hours on-demand video
  • 16 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn to make wireless networks more secure.
  • Being aware of all dangers that certain attacks on WLAN bring.
  • Students will know security risks when using different protection mechanisms.
  • Technical and social aspect of securing the wireless networks.
  • Gain skills with working on virtual environments
View Curriculum
  • You should be able to use PC at the begginer level.
  • Knowledge in Linux and networking is a plus, but not mandatory
  • Wireless network card is nedded, preferably USB wireless card/adapter.
  • If choose to work in virtual machine(Vmware, Virtualbox) make sure you have USB wireless card/adapter!

Kali Linux wireless network penetration testing course will help you learn how to make wireless networks more secure. In this course we will be in the role of the attacker, and use different attack tools and techniques, to breach security measures of WLAN. Learn basic and advance protection mechanisms, and how to conduct attacks on them.

Who is the target audience?
  • This course is for anyone who is interested in securiing their wireless networks.
  • Anyone who is interested in IT security and networking
Students Who Viewed This Course Also Viewed
Curriculum For This Course
43 Lectures
Intoduction and setting the work environment
6 Lectures 36:58

Introduction to the course.

Preview 03:38

Basic info on penetration testing and Kali linux operating system.

Preview 03:14

In this video we will download and install vmware/virtualbox(depending on your choice), and set Kali linux on vmware. We will also look into hashes and learn how hash checking works.

Downloading and installing virtual machine

In this video we will install virtualbox extension pack and set Kali configurations to use it with Virtualbox.

Preview 05:57

Dealing with usb filtering problem on certain windows hosts.

Preview 05:01

Setting the work environment. Wireless access point and working interface of Kali.

Setting the work environment
Monitoring mode - bypassing WLAN authentications
8 Lectures 57:16

Information about wireless networks in general. Advantages, disadvantages, different sorts and technologies. 

Wireless networks and its weaknesses

Putting usb wireless card in monitor mode

Monitor mode

Fire up wireshark and sniff first data over network. Faster and easier use of wireshark with filters is adressed.

Wireshark sniffing and filtering

First injection test using aireplay and wireshark

Injecting the packets

Different settings and configurations of usb wireless card. Channel, power changing, regulatory settings

Settings and configurations of usb wireess card

Setting and bypassing Hidden SSID authentication mechanism.

Hidden SSID

Setting and bypassing MAC filtering authentication mechanism.

MAC filtering

Summary of section two.

Quick summary of section two
Wireless network encryption methodologies
10 Lectures 01:16:39

Basic information about cryptography. Cryptographic algoritms and wireless cryptography mechanisms.

Cryptography - Basic info

What it is, and how WEP works. What are its weaknesses and setting WEP on access point.

WEP encryprtion

Step by step of cracking WEP.

Cracking WEP

Caffe latte and Hirte attacks on users of WEP network. Cracking WEP through client.

Caffe latte and Hirte attack

What it is, and how WPA works. What are its weaknesses and setting WPA on access point.

WPA encryption

Step by step cracking of WPA.

Preview 08:42

Brute force attack on WPA with crunch.

Preview 09:52

Brute force attack using hashcat tool.

Cracking WPA - Hashcat

Decryption of captured packets(WEP and WPA) using cracked keys.

Decrypthing WEP and WPA packets

Summary of section three.

Quick summary of section three
Attacks on infrastructure and clients of WLAN
7 Lectures 53:44

Exploiting flaw of certain routers with WPS protection enebled. What WPS is, and how to crack it with Reaver brute forcing.

Cracking WPS - Wif protected setup

Cracking WPS, on certain routers using combination of mdk3 flood attack and reaver. Simplified with ReVdK3 script too which is provided as resource.

Cracking WPS - ReVdK3 script

Conduction various DoS attacks with aireplay-ng and mdk3.

DoS attacks - denial of service

Attacks on web forms, particularly on admin control panel of wireless networks. Dictionary attack with Hydra.

Hacking admin control panel - Hydra tool

Creating evil twin access point. Fake access point, that replicates legitimate access point of the network. Starting point for many dangerous attacks on users of network, such  as man-in-the-middle attacks.

Evil twin attack

Creating rogue access point. Malicious fake access point that functions as starting point for many dangerous attacks on users of network, such as man-in-the-middle attacks.

Rogue access point attack

Summary of section four.

Quick summary of section four
Advanced attacks
7 Lectures 50:41

Conducting MITM attack with rogue access point. Eavesdropping on traffic as MITM.

MITM eavsdropping

MITM session hijack with dns spoofing and phishing techniques. 

MITM session hijack - dns spoofing

Conducting Man-in-the-middle attacks with Ettercap tool.

MITM with Ettercap tool

Conducting Man-in-the-middle attacks with Bettercap tool.

MITM with Bettercap tool

WPA-Enterpraise. More advanced method of WPA encryption for WLAN. Mostly used by companies and big wireless networks. Theory behind it, and setting up

WPA-Enterpraise - setting up

Step by step cracking of WPA-Enterpraise

Cracking WPA-Enterpraise

Quick summary of section five.

Quick summary of section five
1 Lecture 06:49

Conclusion of what was done in this course. Protection of technical and social aspect of networks. Protecting from even most advanced attacks is possible, but absolute protection never is. Tips and tricks for more protection is given and some closing words.

Conclusion - Closing word
Bonus content - Extra tutorials
4 Lectures 21:03

Manual installation of Kali linux 

Installing Kali manually

Tips and tricks of how to find and set up wifi drivers on Kali.

Finding info on wifi drivers

Changing desktop environment for Kali linux. Sometimes vmware can keep buging  with new versions of Kali on default desktop environment, Changing it solves that problem.

Preview 02:24

Sometimes default virtual hdd size of Kali image is not enough. On vmware it is little tricky to increase size of hdd. It requires external software. This video shows entire process of increasing size in few minutes.

Preview 05:34
About the Instructor
Aleksa Djokovic
4.5 Average rating
25 Reviews
2,453 Students
2 Courses
IT Engineer

IT Engineer with many successful projects behind him. Security, and Linux enthusiast. Programmer with knowledge in C , C#, Java, SQL, PHP, CSS, HTML,  XML, UML. Constantly improving knowledge in IT sector. Some of the projects I worked on: Complete security testing of WLAN for individuals and bussineses, cattering service (Java, JSP), Online Pet Shop - complete softver development(C#, ADO.NET, UML, SQL), Bus station, bookstore and others software solutions. Currently improving Linux administration skills.