YoVDO

Complete WIFI Hacking Course With Powerful MITM Techniques

Offered By: Udemy

Tags

Ethical Hacking Courses Cybersecurity Courses Network Security Courses Social Engineering Courses HashCat Courses

Course Description

Overview

Crack WPA/WPA2 PSK Passwords, MITM, Social Engineering , Aircrack-ng Suite, Advanced Password Recovery with Hashcat

What you'll learn:
  • Setting up wireless penetration testing lab
  • Crack WPA/WPA2 PSK passwords
  • Aircrack-ng suite (Airmon-ng, Airodump-ng, Aireplay-ng, Airbase-ng)
  • Denial of Service attack (DoS)
  • Hashcat (Brute-force attack, Dictionary attack, Combinator attack, Rule-based attack )
  • 2 powerful MITM techniques
  • Evil twin attack using captive portral
  • Fake firmware upgrade method
  • Rainbow table attack with genpmk and cowpatty
  • Using CMD to view saved passwords
  • Creating simple batch script to steal saved passwords
  • Compiling batch script into undetectable and invisible EXE
  • Using a USB an simple social engineering to steal wifi passwords
  • WEP Cracking
  • Creating Evil-Twin AP from Scratch
  • Configuring SSL with Openssl
  • Dnsmasq and Hostapd
  • Integrating custom template into Airgeddon

Welcome to the best WIFI hacking course ever.

Before beginning WIFI Hacking, I will teach you super powerful social engineering techniques to steal WIFI passwords. I will teach you how to create an automated batch script for steal saved passwords and compiling them into undetectable and invisible EXE files. Then, we can use a USB stick to trick the owner and steal passwords. You can do this part with windows (no need to install kali) .Then we will start learning how to hack wifi with Kali Linux.

There are four sections in this course

In the first section, I will explain how to set up our wireless penetration lab,installing kali Linux in the VMware and basic settings of kali after installation, then how to choose a correct wireless adapter and installing it into the virtual machine

In the second section, you will learn the basics of wireless penetration testing(Basics of Aircrack-ng suite)

I will explain four basic modes of the wireless interface, putting the wireless interface into monitor mode( using airmon-ng), denial of service attack(using aireplay-ng), and capturing the WPA handshake(using airodump-ng). At the end of this section, I will teach the primary password recovering technique using aircrack-ng. Then I will explain how to automate this multi step process using a tool called Wifite.

In the 3rd section, I will explain how to use hashcat for advanced password recovery

You will learn four advanced password recovering techniques.They are,

Brute-force attack, Dictionary attack, Combinator attack and Rule-based attack.

At the end of these sections, you will be able to hack WIFI networks with WPA/WPA2 PSK.

There is a Quiz with 10 MCQs at the end of this part.

The final section is the most exclusive

I will explain how the MITM attack works, installing required tools to launch the attack ( airgeddon and fluxion), then redirecting the owner of the AP into our fake login page. You will learn 2 MITM techniques,

(You will get 2 powerfull tools with this course)

· Evil Twin Attack Using Captive Portral

· Fake Firmware Upgrade Method

After that, I will explain how to create owr own Evil-Twin AP using Hostapd,Dnsmasq and Openssl. Then final lecture is about integrating our custom template into Airgeddon and automating custom Evil-Twin AP.

I will be continously updating this course with new things. Therefore, you will receive value for every penny you spend on this course .


DISCLAIMER

All the tutorials in this course are related to the Computer Security and not promoting hacking / cracking. They are only for informational and educational purpose only. Sodo not attempt to violate the law with anything contained here. Please refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. I 'm not responsible for any misuse of these materials.

Let 's start learning


Taught by

Maneesha S. Nirman

Related Courses

Credential Access with Hashcat
Pluralsight
The Complete Ethical Hacking Course for 2016/2017!
Udemy
Hacking Course - Go from Beginner to Advanced
Joseph Delgadillo via YouTube
Kali Linux Hacking Tutorials
YouTube