Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

25+ Videos to teach you how to test the security of Wi-Fi Keys (WEP/WPA/WPA2) From Scratch
4.3 (73 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,308 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 30
  • Length 2.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2015 English

Course Description

Notes:

  1. This Price is for the 1st 1000 students, so it will go up after that.
  2. All the videos in this course are downloadable.

In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks. At the end of the course you will learn how to configure wireless networks to protect it from these attacks.

This course is focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack, the attacks explained in this course are launched against real devices in my lab.

The Course is Divided into four main sections:

  1. Networks Basics: in this section you will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn a number of attacks that you can launch without the need to know the password such as controlling all the connections around you (ie: deny/allow any device from connecting to any network).
  2. WEP Cracking: Now that you have gathered information about all the networks around you, and found your target, you will learn how to crack the key that the target uses. In this section you will learn three methods to crack WEP encryption. First you will learn the weaknesses in WEP that allow us to crack it, then you will learn the theory behind each method and finally you will learn how to launch that attack against WEP networks and obtain their key.
  3. WPA Cracking: in this section you will learn a number of methods to crack WPA/WPA2 networks, again you will learn the weakness in WPA and theory behind each method first, and then you will learn how to launch the attack against a real network.
  4. Protection: At this stage you will know the weaknesses and methods that real life hackers use, therefore it will be very easy for you to secure your network against these attacks. In this section you will learn how to configure your wireless networks so that the above attacks will not work, you will learn what settings need to be changed, how to access the router settings and how to change these settings.

All the attacks in this course are practical attacks that work against real wireless networks, all of the attacks are carried out against real networks in my lab. Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.


NOTE: This course is totally a product of Igneus Technologies and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

What are the requirements?

  • Basic IT skills
  • Wi-Fi card (preferably one that supports injection)
  • Kali Linux (can be download for free)

What am I going to get from this course?

  • Have a good understanding of how networks operate
  • Understand how devices communicate with each other in a netowrk
  • Discover wireless networks within range
  • Gather information about wifi networks
  • Discover connected devices to each wifi network within range
  • Disconnect any device from any network within range
  • Learn the main weaknesses of WEP encryption and how it can be cracked
  • Launch interactive packet reply attack to crack WEP encryption
  • Launch chopchop reply attack to crack WEP encryption
  • Launch fragmentation attack to crack WEP encryption
  • Learn WPA/WPA2 weakness and the theory behind cracking it
  • Exploit WPS feature to crack WPA/WPA2 without a wordlist and without the need to any connected clients
  • Capture handshake and launch word list attack
  • Create your own wordlist
  • Launch a wordlist attack using the GPU
  • Launch a word list attack using a rainbow table
  • How to protect wireless networks from cracking attacks
  • Spot weaknesses in wireless networks in order to protect your network
  • Configure wireless networks to protect against the discussed attacks

What is the target audience?

  • People interested in learning how to test the security of WiFi keys/passwords

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

03:25

Welcome to the course, this lecture will give you a full outline of the structure of the course, and will give you an over view of what will you learn in each section.

Section 1: Preparation
08:04

This lecture will give you an overview of what software you need to install for this course, and how it can be installed.

You will also see how to install Kali as a virtual machine.

10:01

In this lecture you will learn how to install Kali Linux using the iso image.

Skip this lecture if the method above works for you and you're happy enough with it.

07:05

In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.

You will also learn how to connect your external wifi card to the virtual machine, this is extremely important for future videos.

Section 2: Network Basics
03:09

In this lecture we shall talk about some basics that we need to understand before we can start learning how to test network's security.

04:44

In this lecture you shall learn what do mean by MAC address, what are they used for and how to change your MAC address.

05:02

This lecture will clarify why is it possible to capture any packet around us even if it's not directed to our device, you will learn about two wireless modes: monitor and managed mode, you shall learn what is the difference between them, when do we use each of them and how to correctly enable monitor mode on your wireless card. 


02:36
Since the last update of Aircrack-ng which comes pre installed with Kali 2, arimon-ng stopped working for some wifi cards, therefore if it deos not work for you, I recommend using this method to enable monitor mode.
03:16

This video shows another method that can be used to enable monitor mode just incase the method explained in the previous lectures did not enable it properly for you.

05:40

Now you will learn how to use airodump-ng to see all the access points and associated clients that are within your wireless range and gather information about them.

07:27

In this lecture , we shall learn how to launch airodump-ng on a specific AP , and store all packets in a capture file.

05:17

Deauthentication attacks allow us to disconnect (disassociate) any connected client to any network that is within our wifi range even if the network uses encryption (such as WEP/WPA/WPA2).

Cracking Sections Introduction
01:21
Section 3: WEP Cracking
03:26

This lecture explains the weaknesses in WEP encryption and how we can use these weaknesses to break it.

06:27

In this video we shall learn the basics of cracking WEP encryption , the target is a WEP encrypted network with active clients.

06:10

In this lecture we shall learn the theory behind cracking WEP encrypted APs with no or idle clients.

To do this we shall learn three methods of packet injection, but before we can inject packets into the traffic we need to authenticate our wifi card with the target AP so that it does not ignore our requests as AP's only accept packets from associated devices, therefore we shall learn how to fake authenticate our wifi card with the target AP so that it starts accepting packets from us.

04:44

This is the first method of cracking idle or client less AP's that we shall learn .

In this method , after successfully associating with the target AP , we will wait for an ARP packet , we will then capture this packet and inject it into the traffic , this will force the AP to generate a new ARP packet with a new IV , we capture this new packet and inject into the traffic again , this process is repeated until the number of IV's captured is sufficient enough to crack the key.

08:28

This is the 2nd method of cracking idle or client less AP's.

In this method we will capture an ARP packet and attempt to guess its key stream and use it to forge a new packet (using packetforge-ng) ,then we can inject this new forged packet into the traffic to generate new IV's.

07:44

This is the 3rd method of cracking idle or client less AP's.

The goal of this method is to obtain 1500 bytes of the PRGA (pseudo random generation algorithm) , this can be used to forge a new packet which can be injected into the traffic to generate new IV's.

Section 4: WPA/WPA2 Cracking
02:03

This is an introduction to WPA/WPA2 , we shall learn what is the main difference between WPA and WEP and why WPA is more difficult to crack.

07:17

In this lecture we shall learn how to exploit the WPS feature to crack WPA/WPA2 encrypted AP's without a wordlist attack and without the need to any connected clients.

02:18

In this lecture we shall learn the theory behind cracking WPA/WPA2 encryption.

04:43

In this lecture we shall learn how to capture the handshake from the target AP.

06:08

To crack WPA/WPA2 we need to use a wordlist attacks , you can download ready wordlists from the internet or create your own by following this lecture.

03:04

In this lecture we will use the wordlist created in the previous lecture to crack the WPA keyusing aircrack-ng.

07:00

GPU's are faster than CPU's , there for if you have a powerful GPU you can use hashcat to crack the WPA/WPA2 key using the GPU, this would be much quicker than using aircrack-ng which uses the CPU.

06:28

GPU's are faster than CPU's , there for if you have a powerful GPU you can use hashcat to crack the WPA/WPA2 key using the GPU, this would be much quicker than using aircrack-ng which uses the CPU.

Section 5: Protection
Securing Your Network
Article
06:25

In this video you will learn how to access the settings page for your router and change the settings to increase the security of your wireless network.

Section 6: Bonus Section
Bonus Lecture - Discounts On My Full Ethical Hacking Courses
Article

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Zaid Sabih, Ethical Hacker, Pentester & Computer Scientist

My name is Zaid Al-Quraishi , I am an ethical hacker, pentester and a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. 

I have a very good experience in ethical hacking. I started making video tutorials since 2009 in an ethical hacking website (iSecuri1ty), I received very good feedback for my tutorials which lead to promoting me as an editor in the website. I also work in the penetration testing team of iSecur1ty.

In 2013 I started teaching my first course online in the training center in iSecur1ty, again this course received amazing feedback for learners, which motivated me to create an English version of this course.

The english course was the most popular and the top paid course in Udemy for almost a year, again the feedback was amazing, therefore I decided to make more courses on ethical hacking, so I released a number of other courses which are doing just as good as that one.

My method of teaching is mostly by example, so I usually start by explaining the theory behind each technique, then I show you how it actually works in a real life situation.

Ready to start learning?
Take This Course