
Kali Linux 2017 Wireless Penetration Testing for Beginners
Можно купить
Эпизоды
С.1, эп. 1: The Course Overview
27 февраля 2018 г.7 минThis video provides an overview of the entire course.Можно купитьС.1, эп. 2: Wireless Network Signals
27 февраля 2018 г.6 минWe will discover the methods and techniques along with some meanings behind the different wireless network signals.Можно купитьС.1, эп. 3: Wi-Fi Pineapple
27 февраля 2018 г.2 минWhile using a regular Wireless card will get us by with this course, we can take a huge advantage of the Wi-Fi Pineapple and discover some of the powers behind this amazing antenna.Можно купитьС.1, эп. 4: Yagi Antenna
27 февраля 2018 г.3 минIs your target a little out of your wireless cards reach? With a Yagi antenna, you don't have that issue... Unless they are extremely far away. When setup properly, a Yagi antenna can reach up to 1500 kilometres away.Можно купитьС.1, эп. 5: Getting Used to Kali
27 февраля 2018 г.7 минNow we have seen some of these awesome tools, we have watched Mr. Robot at least 100 times, and have seen the Hackers trilogy, it is time to start learning. What better way to do that than with Kali Linux!Можно купитьС.1, эп. 6: Creating a Password Dictionary
27 февраля 2018 г.7 минWhen we attempt to crack a password (Wireless | Server | Website | Phone | ETC.) We need Dictionary of Passwords. This will allow us to insert several different passwords in a text file and use that document later on in our arguments against our target.Можно купитьС.1, эп. 7: Wireless Security Protocols
27 февраля 2018 г.4 минWe know that Wi-Fi networks are connected by either WEP/WPS/WPA/WPA2, however, do we understand those security protocols? Don't worry, in this section we will be learning about each of them.Можно купитьС.1, эп. 8: Scanning for Wireless Networks
27 февраля 2018 г.9 минAlright, so we have our Kali Linux installed, and we want to connect to the internet. But we don't have any. What should we do? With Kali, we can scan to see who has internet around us.Можно купитьС.1, эп. 9: Cracking Wi-Fi Passwords
27 февраля 2018 г.8 минSo, we have found our target Wi-Fi, and we have built our own Password Dictionary, now what? We will now need to see if we can crack the password for our target.Можно купитьС.1, эп. 10: Hacking/Cracking Our Way into the Target
27 февраля 2018 г.4 минSo, we have the password of our network SSID. Now what do we do? Simply put, we connect to the desired network the same way you would connect to your home network. Then we can start surfing the internet.Можно купитьС.1, эп. 11: Exploiting Our Target
27 февраля 2018 г.7 минDo you have a hunch about your neighbour? Anything unusual going on? After connecting to his Wi-Fi network, we can use WireShark to help us intercept his traffic to see what is going on.Можно купитьС.1, эп. 12: Scanning Airwaves
27 февраля 2018 г.5 минWhile there are a few different ways we can search for different wireless networks, we can easily do so with the GUI. This is the typical way that people search and connect to wireless networks.Можно купитьС.1, эп. 13: Hunting Down Networks
27 февраля 2018 г.8 минWant to feel like a real hacker and read the terminal like a pro? We can do that by utilizing a script that will allow us to search for wireless networks on our terminal.Можно купитьС.1, эп. 14: MitM Attacks
27 февраля 2018 г.10 минSo we are connected to our target, what fun can we do? The first thing we are able to do is perform a MitM attack in which puts us in between 2 people talking to each other. This allows us to intercept their conversation to inquire personal information.Можно купитьС.1, эп. 15: Finding Ourselves an Access Point
27 февраля 2018 г.16 минBut don't we already have a solid internet connection with our target? Yes, yes we do. However, our target may also be hosting a private network (Hidden SSID) that they don't want the public to know about. Wonder what is on that network?Можно купитьС.1, эп. 16: Setting up Lab
27 февраля 2018 г.5 минBefore we crack any wireless network, we must first learn how to setup our network card to handle the requests and monitor the SSIDS.Можно купитьС.1, эп. 17: Scanning WEP Networks
27 февраля 2018 г.13 минNow that we have our computer setup, we can start off by searching for different WEP Networks in the area. This is done by setting our wireless card to monitor status.Можно купитьС.1, эп. 18: Cracking WEP Connections
27 февраля 2018 г.9 минBy selecting our target to hack, we can then move onto cracking their wifi password. This can be done by using either the default password dictionaries that comes with Kali, or with our own dictionary we created.Можно купитьС.1, эп. 19: Intercepting Connections (URLSnarf)
27 февраля 2018 г.6 минBy utilizing URLSnarf, we can intercept the HTTP connection requests that are stored inside of the CFL. This will help us understand who our target is and what they do.Можно купитьС.1, эп. 20: Setting up Our Lab
27 февраля 2018 г.5 минFirst thing is first, we need to configure our wireless network card to monitor the networks. Doing this helps us search for wireless networks in the area.Можно купитьС.1, эп. 21: Scanning WPS Networks
27 февраля 2018 г.4 минSo our "Lab" is now setup and ready to start scanning. The first thing we will be doing is performing a -wps scan using wifite. This will allow us to scope out only the WPS encrypted networks in our area.Можно купитьС.1, эп. 22: Brute Forcing WPS Connections
27 февраля 2018 г.5 минIt all comes down to this! We have setup our lab to monitor mode, and have scoped out our target. We have also created our own Password Dictionary files. Now we can use WIFITE with AirCrack-NG in order to brute force our way past the password.Можно купитьС.1, эп. 23: Intercepting Connections (EtterCap)
27 февраля 2018 г.6 минCongratulations! You have now hacked your way into your target's Wi-Fi network. Now what? Well, one thing we can do is intercept their internet connections to see what they do online. We can do this by using EtterCap.Можно купитьС.1, эп. 24: Setting up Our Lab
27 февраля 2018 г.2 минLike all great hackers, we pave the way of our setup. This means we will be using a few tools to setup our wireless card in order to monitor and record our network connections to start the hacking process.Можно купитьС.1, эп. 25: Search for WPA/WPA2 Networks
27 февраля 2018 г.3 минWe will begin by performing a simple search using WIFITE in order to help us scan the area to select our target. By using WIFITE we are able to see a list of WPA/WPA2 enabled wireless networks within our area.Можно купить