WiFi Hacking: Your Guide to Wireless Penetration Testing
4.8 (41 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
295 students enrolled
Wishlisted Wishlist

Please confirm that you want to add WiFi Hacking: Your Guide to Wireless Penetration Testing to your Wishlist.

Add to Wishlist

WiFi Hacking: Your Guide to Wireless Penetration Testing

Your complete guide to understanding WEP, WPA, and WPA2 wireless security and how to exploit their vulnerabilities!
4.8 (41 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
295 students enrolled
Created by Jason Dion
Last updated 8/2017
English
English
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • 1 Article
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • You will be able to determine the secret password used by WEP, WPA, and WPA2 networks
  • You will be able to conduct basic penetration testing on Wireless Networks
  • You will be able to change your MAC address and impersonate other devices on a wireless network
View Curriculum
Requirements
  • An understanding of the hacker's methodology
  • A basic working knowledge of using Kali Linux
  • A basic understanding of how computer networking works
Description

** Updated: July 2017 with all new enhanced audio and full English closed captions! **

Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks.

This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. 

What Other Students Are Saying About This Course:

  • Just completed the course as a newbie and followed all steps exactly and was able to complete everything!! Thank you Jason!!!! (Stephanie, 5 stars)
  • Great course that goes into detail of how vulnerable Wireless really is. Would definitely recommend to anyone who wants to go into InfoSec or Network Security. (Matthew, 5 stars)
  • Great course. Step by step instructions, good quality audio and video lectures. Easy to understand instructor is very important, especially when he explains everything in detail. (Alisher, 5 stars)

Who is the target audience?
  • Anyone who wants to learn how to conduct wireless network hacking as part of a penetration test
  • Anyone who is interested in understanding the vulnerabilities in wireless security standards such as WEP, WPA, and WPA2
Students Who Viewed This Course Also Viewed
Curriculum For This Course
32 Lectures
01:44:47
+
Welcome to Wireless (WiFi) Network Hacking
3 Lectures 04:59

A quick introduction and overview to this wireless hacking course that details what we are going to cover throughout the course.

Preview 01:04

This lecture covers the basic pieces of equipment you will need to setup your own Wireless Hacking lab in order to follow along with all the examples in this course. This includes a wireless router/access point, a wireless network card capable of being in promiscuous mode and doing packet injection), and an optional longer antenna.

The specific equipment utilized in this course is listed below, but you can substitute any other piece of equipment that has similar features.

  • Wireless Router/Access Point: Netgear N300 (You can use any Wireless Access Point that supports WEP, WPA, and WPA2)
  • Wireless Network Card (Alfa Network AWUSO36NH)
  • 9 dB Antenna (Alfa Networks 9 dB removable antenna)
Preview 02:55

Disclaimer: This course is for defensive purposes only! The skills you are taught in this course are to be used in valid, authorized, and agreed upon penetration testing by those conducting ethical hacking activities for the target organization.

Preview 01:00

This short quiz ensures you understand why each piece of equipment is required during Wireless Hacking.

Required Equipment Quiz
2 questions
+
Configuring WiFi Hacking Tools
5 Lectures 13:34

VirtualBox is used to create a virtual machine from which we will conduct our wireless hacking throughout this course. VirtualBox is a free virtualization software that is available for installation on Windows, Macintosh, and Linux operating systems as open-source and free-to-use software. You can download it from VirtualBox.org. 

In this lecture, I will walk you through how to install the software on your machine. (The example computer being used is Mac, but the process is nearly identical for Windows machines.)

Installing Virtual Box
01:59

An important message from Jason on the course!

An Important Message About the Course
00:55

Kali Linux is a well-known and freely available penetration testing platform. In this lecture, we will walk through how to download and install Kali Linux into the VirtualBox virtualization platform for use in our wireless hacking throughout the rest of the course.

Kali Linux is available to download for free from Kali.org.

Installing Kali Linux in a VirtualBox
06:13

Before we begin setting up our wireless card and hacking some networks, we want to ensure we are using the latest and most secure versions of the software. In this lecture, we will update and upgrade our Kali Linux software using two commands in the text-based Terminal: apt-get update & apt-get upgrade.

Updating Kali Linux to the Latest Software
02:51

In this lesson, we will setup the Alfa Network 36NH Wireless Network controller to be used by Kali Linux in our VirtualBox environment. 

Setup the USB WiFi Card with Kali Linux
01:36

This quiz covers a few of the key concepts covered by the Configuring WiFi Hacking Tools section of the course.

Configuring WiFi Hacking Tools Quiz
2 questions
+
Setting Up Your Wireless Access Points
2 Lectures 07:10

You will learn how to setup and configure Wired Equivalent Privacy (WEP) on an example Wireless Access Point. This will serve as our victim in our lessons on WEP cracking.

In this video, the Verizon Quantum Router is being used as the Wireless Access Point (WAP).

Configuring Wireless Equivalent Privacy (WEP) on the Access Point
03:12

You will learn how to setup and configure WiFi Protected Access v2 (WPA2) on an example Wireless Access Point. This will serve as our victim in our lessons on WPA2 cracking.

In this video, a Netgear N300 is being used as the Wireless Access Point (WAP).

Configuring WiFi Protected Access v2 (WPA2) on the Access Point
03:58

This is a short quiz to ensure you mastered the key points from the Setting Up Your Wireless Access Points section.

Setting Up Your Wireless Access Points Quiz
1 question
+
Wireless Networking Concepts
8 Lectures 25:12

A short history of wireless networks, including the five major types you will find during your scans, their frequencies, and their speeds.

Types of Wireless Networks
03:39

In this lesson, we will discuss the concepts behind concealing your MAC address, the reasons why you might want to do that, and the commands used in Kali Linux to accomplish this easily.

We will use the following commands:
ifconfig & macchanger

Preview 02:37

In this lesson, we will demonstrate how to change your MAC addresswith the commands used in Kali Linux to accomplish this easily.

We will use the following commands: ifconfig & macchanger

Changing Your MAC Address to Impersonate Other Users
04:15

In this short lesson, we will discuss what Promiscuous Mode is, and why it is so important in hacking wireless networks. 

Preview 01:27

In this lesson, you will learn the first method for configuring your WiFi card for promiscuous mode, which will allow it to capture all the traffic on the wireless networks (regardless of if it is addressed to your machine or not).

We will use the following commands:
ifconfig & iwconfig

Preview 04:11

In this lesson, you will learn the second method for configuring your WiFi card for promiscuous mode, which will allow it to capture all the traffic on the wireless networks (regardless of if it is addressed to your machine or not). This method is quicker and easier than the first one we demonstrated in the last lesson.

We will use the following commands:
iwconfig & airmon-ng

Setting Up Promiscuous Mode (2nd Method)
01:10

In this lesson, we will cover the basics of Airodump-ng and the proper command syntax to establish data capturing of the victim wireless network.

Introduction to Airodump-ng
02:29

In this lesson, we will use airodump-ng to monitor the wireless networks within range of our Kali Linux machine. We will cover the different types of information that we can gain using airodump-ng and show how we can setup capturing the network traffic from a single wireless network using the tool, as well.

We will use the following commands:
airodump-ng

Gathering Wireless (WiFi) Information with Airodump-ng
05:24

A short quiz to verify you know which tools to use for which job.

Wireless Networking Concepts Quiz
2 questions
+
Wired Equivalent Privacy (WEP)
4 Lectures 14:37

In this lesson, you will learn the fundamental concepts of the Wired Equivalent Privacy encryption standard for wireless networks. This will help ensure the concepts are well understood before we attack this in the lab.

Wired Equivalent Privacy (WEP)
02:59

This lesson provides an overview of the WEP hacking process before we enter the lab. This includes scanning for a vulnerable network, dumping the network traffic to a file, and cracking the WEP key from that network traffic.

How to Hack WEP
02:08

In this lesson, you will learn how to do a fake authentication attack using aireplay-ng. The fake authentication attack allows you to perform authentication using either Open or Shared Key WEP authentication. You will then do an ARP request replay attack. This is the most effective way to generate new initialization vectors (IVs) and works very reliably. Unfortunately, this is a noisy attack than simply collecting data using airodump-ng and waiting to collect enough IV's. 

In this attack, aireplay-ng collects an ARP packet and retransmits it back to the wireless access point. This causes a chain reaction where the access point repeats the ARP packet with a new IV repeatedly. By collecting all these IV's, we are able to crack the WEP Shared Key.  

We will use the following commands:

  • airodump-ng
  • aireplay-ng
  • aircrack-ng
Hacking WEP Using the Fake Authentication and ARP Replay Attacks
07:28

In this lab, you will learn how to reconfigure your Kali Linux machine's network card back to managed mode and connect to a wireless network. Here, we will use the key we just gained from our WEP Cracking to connect to the WEP network successfully for further exploitation.

Connect to a WiFi Network in Kali Linux Using the WEP Key We Found
02:02

A short quiz on the concepts and tools used during WEP cracking.

Wired Equivalent Privacy (WEP) Quiz
2 questions
+
WiFi Protected Access (WPA/WPA2)
6 Lectures 22:48

A short introduction to Wireless Protected Access (WPA) and WPA2. You will learn the security architecture of these two protocols and how we plan to circumvent the security in our hands-on labs.

WiFi Protected Access (WPA/WPA2)
03:16

In this lesson, you will learn why using a brute force is the sure fire way to crack a password. But, you will also learn why we usually won't resort to a brute force attack and instead favor things like algorithm weakness exploitation or a dictionary attack instead.

Brute Force Attacks
03:30

In this lesson, you will learn how a dictionary attack works and ways to improve your cracking speeds when using a dictionary attack.

Dictionary Attacks
02:58

In this lecture, you will learn about a few places to download very large pre-made dictionaries, and about the various dictionaries that come pre-installed with Kali Linux. We will also learn to edit the pre-made dictionaries to ensure you password is in it for our WPA/WPA2 hacking lesson that is coming up soon!

Downloading and Using Pre-made Dictionaries
04:07

In this lesson, you will learn how to create passwords and pins using the CRUNCH tool. This creates every possible combination for you, automatically!

Tools used in this lesson:

  • Crunch
Creating Your Own Dictionary
02:12

In this lesson, you will learn how to capture a WPA/WPA2 handshake by performing a deauthorization attack against a client, and then crack that handshake using a dictionary attack to find the WPA/WPA2 network password.

Hacking WPA/WPA2 with a Dictionary Attack
06:45

This short quiz covers the concepts behind cracking WPA/WPA2 networks.

WiFi Protected Access (WPA/WPA2) Quiz
2 questions
+
WiFi Protected Setup (WPS)
2 Lectures 11:57

In this lesson, you will learn about how WPS attempts to make configuring your wireless network simply by using a pin code or push button for your devices, and how we can exploit the vulnerability in its implementation to easily gain access to WPA and WPA2 secured networks.

WiFi Protected Setup (WPS)
02:33

In this attack, we will use wash, reaver, and bully to scan for WPS networks, determine the unique PIN that protects them, and then receive a plain text version of the WPA2 password.

Tools used in this lecture:

  • wash
  • reaver
  • bully
Attacking the WPS Configured Network
09:24

This is a short quiz on the concepts used in cracking WPS.

Wireless Protected Setup (WPS) Quiz
2 questions
+
Conclusion
2 Lectures 04:30

In this lecture, you will receive a short course summary and congratulations message!

Conclusion
02:35

In this bonus lecture, I will give you some tips and tricks of where to go from here to continue your learning. Also, Jason will provide you with an exclusive coupon to receive any of my other courses at our lowest discounted price yet!

BONUS: Where to go from here
01:55
About the Instructor
Jason Dion
4.6 Average rating
531 Reviews
8,996 Students
6 Courses
Cybersecurity Expert (CISSP, CEH, Sec+, Net+, A+, ITIL v3)

Jason Dion, CISSP No. 349867, is a Adjunct Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, and Information Technology Infrastructure Library v3. With networking experience dating back to 1992, Jason has been a network engineer for the United States Navy Southern Command, served as the Deputy Director of the Theater Network Operations Center Middle East, and the Information Systems Officer for Navy Information Operations Command Maryland. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance from University of Maryland University College, a Master’s of Arts and Religion in Pastoral Counseling, and a Bachelor’s of Science in Human Resources Management from New School University. He lives in the greater Washington D.C./Baltimore, Maryland area with his wife and two children.