Wireless Penetration Testing with Kali Linux & Raspberry Pi
4.4 (57 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,322 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Wireless Penetration Testing with Kali Linux & Raspberry Pi to your Wishlist.

Add to Wishlist

Wireless Penetration Testing with Kali Linux & Raspberry Pi

Use this small but powerful Raspberry Pi device in order to perform pen testing on your network or for clients.
4.4 (57 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,322 students enrolled
Last updated 11/2016
English
Current price: $10 Original price: $70 Discount: 86% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3.5 hours on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn how to protect your Wireless Network from hackers
  • Discover how hackers are breaking into your network and what you can do about this
  • Better understand the functionality of computer networks
  • Use common Linux tools in order to penetrate Wireless Networks
  • Discover the power of the Raspberry Pi device
View Curriculum
Requirements
  • The course is suitable for beginners so there are no requirements other than the time spent learning
  • A Raspberry Pi device will also be used throughout this course but you can follow along without such a device also
Description

*** Course updated on 11/17/16 with lecture 20 - Speeding up WPA2 cracking with genpmk ***

Welcome to my course on Wireless Penetration Testing with Kali Linux & Raspberry Pi

In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. 

Once you understand how wireless networks are working, we will discuss about how these can be exploited by hackers and what we can do to protect them. This course will take you from a beginner to a more advanced level -- by the time you will complete the course, you will be able to identify the hacking attacks against your network and take the necessary steps to protect it. We will use the same tools that hackers are using in order to protect our networks. All the attacks explained in this course are launched against real devices in my lab.

The course is divided into two main sections:

In the first section, we will discuss about installing the penetration tools on our Raspberry Pi device. In case you don’t want to use a Raspberry Pi, I will explain how to install the pen tools on a virtual machine on your PC or Mac. Next we’ll talk about setting up the wireless adapter and prepare for the actual hack.

In the second section, we will take a look at several hacking attacks and ways to protect our network from these attacks. The hacking attacks are so powerful that they can disrupt our network or compromise it at high level. Topics like bypassing MAC address filtering, shared key authentication, WEP and WAP will be presented step by step.

The course will be completed with a discussion about the techniques that hackers are using to penetrate wireless networks and what we can do to stop them.

This course is an excellent introduction to Network and Systems security. We will use a Raspberry Pi device throughout this course but you can also follow along by installing Kali Linux on your computer, a process described in the course also.

Ever wanted to know how hackers are breaking into your network and what you can do to stop them? Then this course is for you!

We will play the role of a Pen Tester or White Hat Hacker in order to discover network and system vulnerabilities and then see how we can protect against them.

Scan your network for vulnerabilities before hackers are taking action against your system!

Learn how to protect against common vulnerabilities that are present in Operating Systems and how to better understand how Computer Security works.

Don't be caught off-guard and protect your network before hackers discovers the vulnerabilities in your system.

Take action today!

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

Who is the target audience?
  • Anyone interested in protecting computer systems and networks
  • Security experts or novice Linux users who want to learn about Network and System Security
  • This course is targeting anyone interested in discovering how Network Security works, no matter if you are a beginner or expert in this field
Students Who Viewed This Course Also Viewed
Curriculum For This Course
25 Lectures
03:24:46
+
Introduction
11 Lectures 01:33:55

This lecture will be an introduction to the course.

Preview 01:38

In this video we discuss about the Hardware and Software used throughout the course. A Raspberry Pi along with a Kali Linux operating system is used to perform the pen tests in this course but you can use a virtual machine (running on your computer) in case you don't want to invest in a Raspberry Pi device.

Preview 06:55

This lecture describes the download and install procedure of Kali Linux on a Raspberry Pi device.

Downloading and installing Kali Linux on Raspberry Pi
08:54

In this lecture we will download and install Kali Linux in VirtualBox on Windows 8.1.

Downloading and installing Kali Linux in VirtualBox on Windows
08:40

In this lecture we will download and install Kali Linux in VirtualBox on Mac OS X.

Downloading and installing Kali Linux in VirtualBox on Mac OS X
06:18

In this lecture we discuss about the changes added to Kali Linux 2 influence our course and the WiFi Pen Testing world.

What's new in Kali Linux 2 / 2016 - Updated 04.2016
23:02

This lecture describes the process of connecting to the Kali Linux machine running in VirtualBox.

Connecting to Kali Linux for the first time - VirtualBox
04:56

We determine the IP address of our device running Kali Linux and connect to it via SSH.

Connecting to Kali Linux for the first time - Raspberry Pi
08:43

We update our Kali Linux to its latest version.

Updating Kali Linux
03:36

In this video we setup our wireless adapter and connect to our WirelessLab network for the first time.

Setting up your wireless adapter
19:49

Conclusions to first course section.

Conclusions
01:24
+
Bypassing Wireless LAN Authentication
14 Lectures 01:50:53

In this lecture we discuss about discovering hidden SSID of wireless networks.

Preview 07:03

In this lecture we discuss about bypassing MAC address filters and why this setting alone is can not be considered as a security measure.

Bypassing MAC Address filtering
13:17

In this lecture we will discuss about bypassing Share Key Authentication.

Bypassing Shared Key Authentication
06:53

In this lecture we will discuss about bypassing Open System Authentication.

Bypassing Open System Authentication
02:35

This lecture describes the process of cracking WEP encryption.

Cracking WEP
08:42

Cracking WEP encryption with fern wifi cracker.

Cracking WEP with fern-wifi-cracker
07:58

This lecture describes the WPA and WPA2 cracking process.

Cracking WPA & WPA2
11:35

Cracking WPA2 with cowpatty.

Cracking WPA2 with Wifite and Cowpatty
08:40

Speed up WPA/WPA2 cracking by using pre-calculated PMKs.

Speeding up WPA2 cracking with genpmk
11:27

We see how to connect from our Kali Linux to a WPA or WPA2 wireless protected network.

Connecting to a WPA/WPA2 wireless network
04:02

In this lecture we will discuss about the Man in the middle attack.

MITM - Man in the middle attack
15:29

In this lecture we will user Ettercap's graphical interface to perform the Man in the middle type of attack.

Preview 09:15

Conclusions to the Section 2 of the course.

Conclusions
03:36

Bonus Lecture Article
00:21
About the Instructor
Cristian Gradisteanu
4.4 Average rating
1,082 Reviews
33,510 Students
6 Courses
Ethical hacker, software developer and Entrepreneur.

As a software developer, I am responsible for the development of management software products produced by the company. My area of expertise includes programming languages like Java, Objective-C, C#, C++, PHP, Ruby and system administration. With more than 15 years of Desktop software development experience, I discovered that mobiles application programming is something that I would love to do for the rest of my life :)

I am very passionate about teaching everyday people topics that they are interested in. I think that in order to keep up with the latest technology trends your leaning process should be a continuous one.

The biggest goal for me right now is to motivate and inspire others through the form of knowledge. If I can inform someone of ways to achieve a healthy mindset or production solution that makes their life easier, I can officially say that I've done my job.