Kali Linux 2017 Wireless Penetration Testing for Beginners

Kali Linux 2017 Wireless Penetration Testing for Beginners

可供購買
Kali Linux is rated as the #1 security operating system for hackers. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. With this course, you'll learn to connect to a wireless network, by utilizing various tools and software programs, and hack into wireless networks.
20181 季
全部
27 集
  • 第 1 集。The Course Overview

    第 1 集。The Course Overview

    This video provides an overview of the entire course.
    This video provides an overview of the entire course.
    全部
    7 分鐘
    2018年2月27日
  • 第 2 集。Wireless Network Signals

    第 2 集。Wireless Network Signals

    We will discover the methods and techniques along with some meanings behind the different wireless network signals.
    We will discover the methods and techniques along with some meanings behind the different wireless network signals.
    全部
    6 分鐘
    2018年2月27日
  • 第 3 集。Wi-Fi Pineapple

    第 3 集。Wi-Fi Pineapple

    While using a regular Wireless card will get us by with this course, we can take a huge advantage of the Wi-Fi Pineapple and discover some of the powers behind this amazing antenna.
    While using a regular Wireless card will get us by with this course, we can take a huge advantage of the Wi-Fi Pineapple and discover some of the powers behind this amazing antenna.
    全部
    2 分鐘
    2018年2月27日
  • 第 4 集。Yagi Antenna

    第 4 集。Yagi Antenna

    Is your target a little out of your wireless cards reach? With a Yagi antenna, you don't have that issue... Unless they are extremely far away. When setup properly, a Yagi antenna can reach up to 1500 kilometres away.
    Is your target a little out of your wireless cards reach? With a Yagi antenna, you don't have that issue... Unless they are extremely far away. When setup properly, a Yagi antenna can reach up to 1500 kilometres away.
    全部
    3 分鐘
    2018年2月27日
  • 第 5 集。Getting Used to Kali

    第 5 集。Getting Used to Kali

    Now we have seen some of these awesome tools, we have watched Mr. Robot at least 100 times, and have seen the Hackers trilogy, it is time to start learning. What better way to do that than with Kali Linux!
    Now we have seen some of these awesome tools, we have watched Mr. Robot at least 100 times, and have seen the Hackers trilogy, it is time to start learning. What better way to do that than with Kali Linux!
    全部
    7 分鐘
    2018年2月27日
  • 第 6 集。Creating a Password Dictionary

    第 6 集。Creating a Password Dictionary

    When we attempt to crack a password (Wireless | Server | Website | Phone | ETC.) We need Dictionary of Passwords. This will allow us to insert several different passwords in a text file and use that document later on in our arguments against our target.
    When we attempt to crack a password (Wireless | Server | Website | Phone | ETC.) We need Dictionary of Passwords. This will allow us to insert several different passwords in a text file and use that document later on in our arguments against our target.
    全部
    7 分鐘
    2018年2月27日
  • 第 7 集。Wireless Security Protocols

    第 7 集。Wireless Security Protocols

    We know that Wi-Fi networks are connected by either WEP/WPS/WPA/WPA2, however, do we understand those security protocols? Don't worry, in this section we will be learning about each of them.
    We know that Wi-Fi networks are connected by either WEP/WPS/WPA/WPA2, however, do we understand those security protocols? Don't worry, in this section we will be learning about each of them.
    全部
    4 分鐘
    2018年2月27日
  • 第 8 集。Scanning for Wireless Networks

    第 8 集。Scanning for Wireless Networks

    Alright, so we have our Kali Linux installed, and we want to connect to the internet. But we don't have any. What should we do? With Kali, we can scan to see who has internet around us.
    Alright, so we have our Kali Linux installed, and we want to connect to the internet. But we don't have any. What should we do? With Kali, we can scan to see who has internet around us.
    全部
    9 分鐘
    2018年2月27日
  • 第 9 集。Cracking Wi-Fi Passwords

    第 9 集。Cracking Wi-Fi Passwords

    So, we have found our target Wi-Fi, and we have built our own Password Dictionary, now what? We will now need to see if we can crack the password for our target.
    So, we have found our target Wi-Fi, and we have built our own Password Dictionary, now what? We will now need to see if we can crack the password for our target.
    全部
    8 分鐘
    2018年2月27日
  • 第 10 集。Hacking/Cracking Our Way into the Target

    第 10 集。Hacking/Cracking Our Way into the Target

    So, we have the password of our network SSID. Now what do we do? Simply put, we connect to the desired network the same way you would connect to your home network. Then we can start surfing the internet.
    So, we have the password of our network SSID. Now what do we do? Simply put, we connect to the desired network the same way you would connect to your home network. Then we can start surfing the internet.
    全部
    4 分鐘
    2018年2月27日
  • 第 11 集。Exploiting Our Target

    第 11 集。Exploiting Our Target

    Do you have a hunch about your neighbour? Anything unusual going on? After connecting to his Wi-Fi network, we can use WireShark to help us intercept his traffic to see what is going on.
    Do you have a hunch about your neighbour? Anything unusual going on? After connecting to his Wi-Fi network, we can use WireShark to help us intercept his traffic to see what is going on.
    全部
    7 分鐘
    2018年2月27日
  • 第 12 集。Scanning Airwaves

    第 12 集。Scanning Airwaves

    While there are a few different ways we can search for different wireless networks, we can easily do so with the GUI. This is the typical way that people search and connect to wireless networks.
    While there are a few different ways we can search for different wireless networks, we can easily do so with the GUI. This is the typical way that people search and connect to wireless networks.
    全部
    5 分鐘
    2018年2月27日
  • 第 13 集。Hunting Down Networks

    第 13 集。Hunting Down Networks

    Want to feel like a real hacker and read the terminal like a pro? We can do that by utilizing a script that will allow us to search for wireless networks on our terminal.
    Want to feel like a real hacker and read the terminal like a pro? We can do that by utilizing a script that will allow us to search for wireless networks on our terminal.
    全部
    8 分鐘
    2018年2月27日
  • 第 14 集。MitM Attacks

    第 14 集。MitM Attacks

    So we are connected to our target, what fun can we do? The first thing we are able to do is perform a MitM attack in which puts us in between 2 people talking to each other. This allows us to intercept their conversation to inquire personal information.
    So we are connected to our target, what fun can we do? The first thing we are able to do is perform a MitM attack in which puts us in between 2 people talking to each other. This allows us to intercept their conversation to inquire personal information.
    全部
    10 分鐘
    2018年2月27日
  • 第 15 集。Finding Ourselves an Access Point

    第 15 集。Finding Ourselves an Access Point

    But don't we already have a solid internet connection with our target? Yes, yes we do. However, our target may also be hosting a private network (Hidden SSID) that they don't want the public to know about. Wonder what is on that network?
    But don't we already have a solid internet connection with our target? Yes, yes we do. However, our target may also be hosting a private network (Hidden SSID) that they don't want the public to know about. Wonder what is on that network?
    全部
    16 分鐘
    2018年2月27日
  • 第 16 集。Setting up Lab

    第 16 集。Setting up Lab

    Before we crack any wireless network, we must first learn how to setup our network card to handle the requests and monitor the SSIDS.
    Before we crack any wireless network, we must first learn how to setup our network card to handle the requests and monitor the SSIDS.
    全部
    5 分鐘
    2018年2月27日
  • 第 17 集。Scanning WEP Networks

    第 17 集。Scanning WEP Networks

    Now that we have our computer setup, we can start off by searching for different WEP Networks in the area. This is done by setting our wireless card to monitor status.
    Now that we have our computer setup, we can start off by searching for different WEP Networks in the area. This is done by setting our wireless card to monitor status.
    全部
    13 分鐘
    2018年2月27日
  • 第 18 集。Cracking WEP Connections

    第 18 集。Cracking WEP Connections

    By selecting our target to hack, we can then move onto cracking their wifi password. This can be done by using either the default password dictionaries that comes with Kali, or with our own dictionary we created.
    By selecting our target to hack, we can then move onto cracking their wifi password. This can be done by using either the default password dictionaries that comes with Kali, or with our own dictionary we created.
    全部
    9 分鐘
    2018年2月27日
  • 第 19 集。Intercepting Connections (URLSnarf)

    第 19 集。Intercepting Connections (URLSnarf)

    By utilizing URLSnarf, we can intercept the HTTP connection requests that are stored inside of the CFL. This will help us understand who our target is and what they do.
    By utilizing URLSnarf, we can intercept the HTTP connection requests that are stored inside of the CFL. This will help us understand who our target is and what they do.
    全部
    6 分鐘
    2018年2月27日
  • 第 20 集。Setting up Our Lab

    第 20 集。Setting up Our Lab

    First thing is first, we need to configure our wireless network card to monitor the networks. Doing this helps us search for wireless networks in the area.
    First thing is first, we need to configure our wireless network card to monitor the networks. Doing this helps us search for wireless networks in the area.
    全部
    5 分鐘
    2018年2月27日
  • 第 21 集。Scanning WPS Networks

    第 21 集。Scanning WPS Networks

    So our "Lab" is now setup and ready to start scanning. The first thing we will be doing is performing a -wps scan using wifite. This will allow us to scope out only the WPS encrypted networks in our area.
    So our "Lab" is now setup and ready to start scanning. The first thing we will be doing is performing a -wps scan using wifite. This will allow us to scope out only the WPS encrypted networks in our area.
    全部
    4 分鐘
    2018年2月27日
  • 第 22 集。Brute Forcing WPS Connections

    第 22 集。Brute Forcing WPS Connections

    It all comes down to this! We have setup our lab to monitor mode, and have scoped out our target. We have also created our own Password Dictionary files. Now we can use WIFITE with AirCrack-NG in order to brute force our way past the password.
    It all comes down to this! We have setup our lab to monitor mode, and have scoped out our target. We have also created our own Password Dictionary files. Now we can use WIFITE with AirCrack-NG in order to brute force our way past the password.
    全部
    5 分鐘
    2018年2月27日
  • 第 23 集。Intercepting Connections (EtterCap)

    第 23 集。Intercepting Connections (EtterCap)

    Congratulations! You have now hacked your way into your target's Wi-Fi network. Now what? Well, one thing we can do is intercept their internet connections to see what they do online. We can do this by using EtterCap.
    Congratulations! You have now hacked your way into your target's Wi-Fi network. Now what? Well, one thing we can do is intercept their internet connections to see what they do online. We can do this by using EtterCap.
    全部
    6 分鐘
    2018年2月27日
  • 第 24 集。Setting up Our Lab

    第 24 集。Setting up Our Lab

    Like all great hackers, we pave the way of our setup. This means we will be using a few tools to setup our wireless card in order to monitor and record our network connections to start the hacking process.
    Like all great hackers, we pave the way of our setup. This means we will be using a few tools to setup our wireless card in order to monitor and record our network connections to start the hacking process.
    全部
    2 分鐘
    2018年2月27日
  • Kali Linux 2017 Wireless Penetration Testing for Beginners
    20181 季
    Kali Linux is rated as the #1 security operating system for hackers. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. With this course, you'll learn to connect to a wireless network, by utilizing various tools and software programs, and hack into wireless networks.
    製作人與演員
    演員陣容
    Aubrey Love, Vijay Kumar Velu
    工作室
    Packt Publishing
    評論
    4.2 out of 5 stars

    6 全球評分

    查看全部評論
    內容警語
    全部
    含有閃光或其他頻繁閃爍的內容,可能會影響對光線敏感的觀眾
    音頻語言
    English
    字幕
    English [CC]
    訂購或觀看,即表示您同意我們的條款。由 Amazon.com Services LLC 銷售。

    意見回饋