Wireless Penetration Testing with Kali Linux & Raspberry Pi

Use this small but powerful Raspberry Pi device in order to perform pen testing on your network or for clients.
4.4 (31 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
925 students enrolled
$20
Take This Course
  • Lectures 24
  • Contents Video: 3 hours
    Other: 0 mins
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2015 English

Course Description

*** Course updated on 14/04/2016 with lecture 6 - What's new in Kali Linux 2 / 2016 ***

Are you into network security or just want to get started in this field?

This course is an excellent introduction to Network and Systems security. We will use a Raspberry Pi device throughout this course but you can also follow along by installing Kali Linux on your computer, a process described in the course also.

Ever wanted to know how hackers are breaking into your network and what you can do to stop them? Then this course is right for you!

We will play the role of a Pen Tester or White Hat Hacker in order to discover network and system vulnerabilities and then see how we can protect against them. Scan your network for vulnerabilities before hackers are taking action against your system. Learn how to protect against common vulnerabilities that are present in Operating Systems and how to better understand how Computer Security works.

Don't be caught off-guard and protect your network before hackers discovers the vulnerabilities in your system.

Take action today!

What are the requirements?

  • The course is suitable for beginners so there are no requirements other than the time spent learning
  • A Raspberry Pi device will also be used throughout this course but you can follow along without such a device also

What am I going to get from this course?

  • Learn how to protect your Wireless Network from hackers
  • Discover how hackers are breaking into your network and what you can do about this
  • Better understand the functionality of computer networks
  • Use common Linux tools in order to penetrate Wireless Networks
  • Discover the power of the Raspberry Pi device

What is the target audience?

  • Anyone interested in protecting computer systems and networks
  • Security experts or novice Linux users who want to learn about Network and System Security
  • This course is targeting anyone interested in discovering how Network Security works, no matter if you are a beginner or expert in this field

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
01:38

This lecture will be an introduction to the course.

06:55

In this video we discuss about the Hardware and Software used throughout the course. A Raspberry Pi along with a Kali Linux operating system is used to perform the pen tests in this course but you can use a virtual machine (running on your computer) in case you don't want to invest in a Raspberry Pi device.

08:54

This lecture describes the download and install procedure of Kali Linux on a Raspberry Pi device.

08:40

In this lecture we will download and install Kali Linux in VirtualBox on Windows 8.1.

06:18

In this lecture we will download and install Kali Linux in VirtualBox on Mac OS X.

23:02

In this lecture we discuss about the changes added to Kali Linux 2 influence our course and the WiFi Pen Testing world.

04:56

This lecture describes the process of connecting to the Kali Linux machine running in VirtualBox.

08:43

We determine the IP address of our device running Kali Linux and connect to it via SSH.

03:36

We update our Kali Linux to its latest version.

19:49

In this video we setup our wireless adapter and connect to our WirelessLab network for the first time.

01:24

Conclusions to first course section.

Section 2: Bypassing Wireless LAN Authentication
07:03

In this lecture we discuss about discovering hidden SSID of wireless networks.

13:17

In this lecture we discuss about bypassing MAC address filters and why this setting alone is can not be considered as a security measure.

06:53

In this lecture we will discuss about bypassing Share Key Authentication.

02:35

In this lecture we will discuss about bypassing Open System Authentication.

08:42

This lecture describes the process of cracking WEP encryption.

07:58

Cracking WEP encryption with fern wifi cracker.

11:35

This lecture describes the WPA and WPA2 cracking process.

08:40

Cracking WPA2 with cowpatty.

04:02

We see how to connect from our Kali Linux to a WPA or WPA2 wireless protected network.

15:29

In this lecture we will discuss about the Man in the middle attack.

09:15

In this lecture we will user Ettercap's graphical interface to perform the Man in the middle type of attack.

03:36

Conclusions to the Section 2 of the course.

Bonus Lecture
Article

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Cristian Gradisteanu, Software developer and Entrepreneur

As a software developer, I am responsible for the development of management software products produced by the company. My area of expertise includes programming languages like Java, Objective-C, C#, C++, PHP, Ruby and system administration. With more than 15 years of Desktop software development experience, I discovered that mobiles application programming is something that I would love to do for the rest of my life :)

I am very passionate about teaching everyday people topics that they are interested in. I think that in order to keep up with the latest technology trends your leaning process should be a continuous one.

The biggest goal for me right now is to motivate and inspire others through the form of knowledge. If I can inform someone of ways to achieve a healthy mindset or production solution that makes their life easier, I can officially say that I've done my job.

Ready to start learning?
Take This Course