Wifi Hacking From A Penetration Testers Perspective

Learn how to hack many different forms of WiFi from a penetration testers perspective

Last updated 2022-01-10 | 3.5

- Perform WiFi assessments based on commonly known vulnerabilities
- exploits and hacking methods
- Gain a better understanding into the world of ethical hacking
- Better understand signal frequency

What you'll learn

Perform WiFi assessments based on commonly known vulnerabilities
exploits and hacking methods
Gain a better understanding into the world of ethical hacking
Better understand signal frequency

* Requirements

* The basics of using Linux based operating systems

Description

This course aims to teach student's how to perform tasks of an ethical hacker/penetration tester specifically from a WiFi hacking perspective. Little to no prior knowledge is required for this course, however knowing a few Linux commands would be beneficial. The course covers the entire process of WiFi based ethical hacking from a professional penetration testers point of view. 

The first set of lectures allows the student to understand what WiFi is and how it works from a technical perspective as well as it's history and associated weaknesses.

The course then looks into the various exploitation techniques a hacker would use and accompanies detailed demonstrations of how to find and exploit such issues. The course also covers potential pitfalls that an ethical hacker may encounter when trying to hack specific encryption levels of WiFi as well as how to combat such issues.

Finally the course concludes with different tools and methods that can be used to break encryption keys to ensure the greatest likelihood of success.

Who this course is for:

  • Beginner level students who are interested in the world of ethical hacking and penetration testing

Course content

1 sections • 69 lectures

1.01-introduction Preview 06:46

1.02-introduction-overview Preview 06:31

2.01-wireless-intro Preview 06:35

2.02-wireless-intro-part2 Preview 06:07

3.01-wifi-basics-wifi-intro Preview 07:02

3.02-wifi-basics-wifi-intro-2 Preview 06:18

3.03-wifi-basics-wifi-concepts Preview 07:27

3.04-wifi-basics-wifi-concepts-2 Preview 06:52

3.05-wifi-basics-wifi-concepts-3 Preview 06:52

3.06-wifi-basics-wifi-phylayers Preview 06:56

3.07-wifi-basics-wifi-phylayers-2 Preview 08:15

3.08-wifi-basics-promiscuous-and-monitor Preview 08:52

4.01-security-intro Preview 06:39

4.02-security-intro-part2 Preview 04:40

4.03-security-intro-part3 Preview 06:24

4.04-security-intro-part4 Preview 08:54

6.01-wifi-security-intro Preview 08:11

6.02-wifi-security-wep Preview 07:13

6.03-wifi-security-wep-part2-R1 Preview 08:08

6.04-wifi-security-wep-part3-R1 Preview 07:04

6.05-wifi-security-wpa-R1 Preview 06:05

6.06-wifi-security-dot1x-R1 Preview 08:37

6.07-wifi-security-wpa2-R1 Preview 07:39

6.08-wifi-security-psk-enterprise-modes-R1 Preview 07:19

6.09-wifi-security-wps-R1 Preview 06:02

7.01-equipment-intro Preview 07:35

7.02-equipment-intro2 Preview 06:58

7.03-equipment-intro3 Preview 08:15

7.04-kali-linux-wireless-tools Preview 06:56

7.05-using-kali-linux-iw Preview 06:03

7.06-monitor-mode-airmon Preview 06:50

7.06a-monitor-mode-wireshark Preview 06:50

7.06b-monitor-mode-wireshark-airodump Preview 06:30

7.07-injection-testing Preview 06:57

7.08-injection-testing-2 Preview 06:08

8.01-wep-passive-attacks Preview 07:56

8.02-wep-attacks-passive-part2 Preview 06:27

8.03-wep-attacks-passive-wireshark Preview 07:42

8.04-wep-attacks-active Preview 08:47

8.05-wep-attacks-active-fragmentation Preview 08:12

8.05a-wep-attacks-fragmentation-wireshark Preview 06:13

8.06-wep-isolated-client Preview 06:46

8.07-wep-cafe-latte-demo Preview 05:39

8.08-wep-cafe-latte-and-hirte Preview 08:30

9.01-wps-reaver-part1 Preview 07:48

9.02-wps-reaver-part2 Preview 06:37

9.03-wps-reaver-part3 Preview 07:37

10-10.hashcat-ec2 Preview 07:04

10.01-wpa-and-wpa2-psk Preview 07:11

10.01a-wpa-and-wpa2-psk-contd Preview 06:07

10.02-wpa-and-wpa2-psk-demo Preview 06:37

10.03-wpa-and-wpa2-psk-demo2 Preview 06:03

10.04-wpa-and-wpa2-psk-wordlists Preview 07:07

10.04a-wpa-and-wpa2-deauth Preview 06:59

10.05-wpa-and-wpa2-psk-isolated-clients Preview 07:27

10.06-wpa-and-wpa2-psk-isolated-clients-demoR1 Preview 06:54

10.07-hashcat-motivation Preview 06:38

10.07a-hashcat-intro Preview 06:49

10.08-wpa-and-wpa2-psk-hashcat-demo Preview 06:33

10.09-wpa-and-wpa2-psk-hashcat-demo-part2 Preview 05:36

10.11-hashcat-ec2-part2 Preview 07:36

10.12-hashcat-ec2-part3 Preview 07:07

10.13-hashcat-ec2-part4 Preview 06:55

11.01-social-fluxion-intro Preview 06:53

11.02-social-fluxion-demo Preview 06:59

11.03-social-fluxion-demo-part2 Preview 06:31

11.04-social-fluxion-demo-part3 Preview 06:04

12-01-conclusions Preview 06:29

12.02-conclusions-part2 Preview 07:36