Kali Linux wireless network penetration testing
3.8 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
36 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Kali Linux wireless network penetration testing to your Wishlist.

Add to Wishlist

Kali Linux wireless network penetration testing

Kali Linux wireless network pentesting: Learn how to secure networks from basic attacks to most advanced ones.
3.8 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
36 students enrolled
Created by Aleksa Djokovic
Last updated 3/2017
English
Current price: $10 Original price: $35 Discount: 71% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 5 hours on-demand video
  • 16 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn to make wireless networks more secure.
  • Being aware of all dangers that certain attacks on WLAN bring.
  • Students will know security risks when using different protection mechanisms.
  • Technical and social aspect of securing the wireless networks.
  • Gain skills with working on virtual environments
View Curriculum
Requirements
  • You should be able to use PC at the begginer level.
  • Knowledge in Linux and networking is a plus, but not mandatory
  • Wireless network card is nedded, preferably USB wireless card/adapter.
  • If choose to work in virtual machine(Vmware, Virtualbox) make sure you have USB wireless card/adapter!
Description

Kali Linux wireless network penetration testing course will help you learn how to make wireless networks more secure. In this course we will be in the role of the attacker, and use different attack tools and techniques, to breach security measures of WLAN. Learn basic and advance protection mechanisms, and how to conduct attacks on them.

Who is the target audience?
  • This course is for anyone who is interested in securiing their wireless networks.
  • Anyone who is interested in IT security and networking
Students Who Viewed This Course Also Viewed
Curriculum For This Course
43 Lectures
05:03:10
+
Intoduction and setting the work environment
6 Lectures 36:58

Introduction to the course.

Preview 03:38

Basic info on penetration testing and Kali linux operating system.

Preview 03:14

In this video we will download and install vmware/virtualbox(depending on your choice), and set Kali linux on vmware. We will also look into hashes and learn how hash checking works.

Downloading and installing virtual machine
09:42

In this video we will install virtualbox extension pack and set Kali configurations to use it with Virtualbox.

Preview 05:57

Dealing with usb filtering problem on certain windows hosts.

Preview 05:01

Setting the work environment. Wireless access point and working interface of Kali.

Setting the work environment
09:26
+
Monitoring mode - bypassing WLAN authentications
8 Lectures 57:16

Information about wireless networks in general. Advantages, disadvantages, different sorts and technologies. 

Wireless networks and its weaknesses
07:32

Putting usb wireless card in monitor mode

Monitor mode
08:09

Fire up wireshark and sniff first data over network. Faster and easier use of wireshark with filters is adressed.

Wireshark sniffing and filtering
06:37

First injection test using aireplay and wireshark

Injecting the packets
06:38

Different settings and configurations of usb wireless card. Channel, power changing, regulatory settings

Settings and configurations of usb wireess card
09:40

Setting and bypassing Hidden SSID authentication mechanism.

Hidden SSID
07:07

Setting and bypassing MAC filtering authentication mechanism.

MAC filtering
09:46

Summary of section two.

Quick summary of section two
01:47
+
Wireless network encryption methodologies
10 Lectures 01:16:39

Basic information about cryptography. Cryptographic algoritms and wireless cryptography mechanisms.

Cryptography - Basic info
05:01

What it is, and how WEP works. What are its weaknesses and setting WEP on access point.

WEP encryprtion
08:05

Step by step of cracking WEP.

Cracking WEP
07:49

Caffe latte and Hirte attacks on users of WEP network. Cracking WEP through client.

Caffe latte and Hirte attack
09:17

What it is, and how WPA works. What are its weaknesses and setting WPA on access point.

WPA encryption
10:47

Step by step cracking of WPA.

Preview 08:42

Brute force attack on WPA with crunch.

Preview 09:52

Brute force attack using hashcat tool.

Cracking WPA - Hashcat
08:39

Decryption of captured packets(WEP and WPA) using cracked keys.

Decrypthing WEP and WPA packets
06:12

Summary of section three.

Quick summary of section three
02:15
+
Attacks on infrastructure and clients of WLAN
7 Lectures 53:44

Exploiting flaw of certain routers with WPS protection enebled. What WPS is, and how to crack it with Reaver brute forcing.

Cracking WPS - Wif protected setup
08:16

Cracking WPS, on certain routers using combination of mdk3 flood attack and reaver. Simplified with ReVdK3 script too which is provided as resource.

Cracking WPS - ReVdK3 script
08:09

Conduction various DoS attacks with aireplay-ng and mdk3.

DoS attacks - denial of service
09:43

Attacks on web forms, particularly on admin control panel of wireless networks. Dictionary attack with Hydra.

Hacking admin control panel - Hydra tool
10:38

Creating evil twin access point. Fake access point, that replicates legitimate access point of the network. Starting point for many dangerous attacks on users of network, such  as man-in-the-middle attacks.

Evil twin attack
05:48

Creating rogue access point. Malicious fake access point that functions as starting point for many dangerous attacks on users of network, such as man-in-the-middle attacks.

Rogue access point attack
08:43

Summary of section four.

Quick summary of section four
02:27
+
Advanced attacks
7 Lectures 50:41

Conducting MITM attack with rogue access point. Eavesdropping on traffic as MITM.

MITM eavsdropping
06:45

MITM session hijack with dns spoofing and phishing techniques. 

MITM session hijack - dns spoofing
07:15

Conducting Man-in-the-middle attacks with Ettercap tool.

MITM with Ettercap tool
08:08

Conducting Man-in-the-middle attacks with Bettercap tool.

MITM with Bettercap tool
07:30

WPA-Enterpraise. More advanced method of WPA encryption for WLAN. Mostly used by companies and big wireless networks. Theory behind it, and setting up

WPA-Enterpraise - setting up
09:40

Step by step cracking of WPA-Enterpraise

Cracking WPA-Enterpraise
06:26

Quick summary of section five.

Quick summary of section five
04:57
+
Conclusion
1 Lecture 06:49

Conclusion of what was done in this course. Protection of technical and social aspect of networks. Protecting from even most advanced attacks is possible, but absolute protection never is. Tips and tricks for more protection is given and some closing words.

Conclusion - Closing word
06:49
+
Bonus content - Extra tutorials
4 Lectures 21:03

Manual installation of Kali linux 

Installing Kali manually
08:22

Tips and tricks of how to find and set up wifi drivers on Kali.

Finding info on wifi drivers
04:43

Changing desktop environment for Kali linux. Sometimes vmware can keep buging  with new versions of Kali on default desktop environment, Changing it solves that problem.

Preview 02:24

Sometimes default virtual hdd size of Kali image is not enough. On vmware it is little tricky to increase size of hdd. It requires external software. This video shows entire process of increasing size in few minutes.

Preview 05:34
About the Instructor
Aleksa Djokovic
4.3 Average rating
23 Reviews
2,441 Students
2 Courses
IT Engineer

IT Engineer with many successful projects behind him. Security, and Linux enthusiast. Programmer with knowledge in C , C#, Java, SQL, PHP, CSS, HTML,  XML, UML. Constantly improving knowledge in IT sector. Some of the projects I worked on: Complete security testing of WLAN for individuals and bussineses, cattering service (Java, JSP), Online Pet Shop - complete softver development(C#, ADO.NET, UML, SQL), Bus station, bookstore and others software solutions. Currently improving Linux administration skills.