
Kali Linux 2017 Wireless Penetration Testing for Beginners
Dostupné k zakoupení
Epizody
S1 E1 – The Course Overview
27. února 20187 minThis video provides an overview of the entire course.Dostupné k zakoupeníS1 E2 – Wireless Network Signals
27. února 20186 minWe will discover the methods and techniques along with some meanings behind the different wireless network signals.Dostupné k zakoupeníS1 E3 – Wi-Fi Pineapple
27. února 20182 minWhile using a regular Wireless card will get us by with this course, we can take a huge advantage of the Wi-Fi Pineapple and discover some of the powers behind this amazing antenna.Dostupné k zakoupeníS1 E4 – Yagi Antenna
27. února 20183 minIs your target a little out of your wireless cards reach? With a Yagi antenna, you don't have that issue... Unless they are extremely far away. When setup properly, a Yagi antenna can reach up to 1500 kilometres away.Dostupné k zakoupeníS1 E5 – Getting Used to Kali
27. února 20187 minNow we have seen some of these awesome tools, we have watched Mr. Robot at least 100 times, and have seen the Hackers trilogy, it is time to start learning. What better way to do that than with Kali Linux!Dostupné k zakoupeníS1 E6 – Creating a Password Dictionary
27. února 20187 minWhen we attempt to crack a password (Wireless | Server | Website | Phone | ETC.) We need Dictionary of Passwords. This will allow us to insert several different passwords in a text file and use that document later on in our arguments against our target.Dostupné k zakoupeníS1 E7 – Wireless Security Protocols
27. února 20184 minWe know that Wi-Fi networks are connected by either WEP/WPS/WPA/WPA2, however, do we understand those security protocols? Don't worry, in this section we will be learning about each of them.Dostupné k zakoupeníS1 E8 – Scanning for Wireless Networks
27. února 20189 minAlright, so we have our Kali Linux installed, and we want to connect to the internet. But we don't have any. What should we do? With Kali, we can scan to see who has internet around us.Dostupné k zakoupeníS1 E9 – Cracking Wi-Fi Passwords
27. února 20188 minSo, we have found our target Wi-Fi, and we have built our own Password Dictionary, now what? We will now need to see if we can crack the password for our target.Dostupné k zakoupeníS1 E10 – Hacking/Cracking Our Way into the Target
27. února 20184 minSo, we have the password of our network SSID. Now what do we do? Simply put, we connect to the desired network the same way you would connect to your home network. Then we can start surfing the internet.Dostupné k zakoupeníS1 E11 – Exploiting Our Target
27. února 20187 minDo you have a hunch about your neighbour? Anything unusual going on? After connecting to his Wi-Fi network, we can use WireShark to help us intercept his traffic to see what is going on.Dostupné k zakoupeníS1 E12 – Scanning Airwaves
27. února 20185 minWhile there are a few different ways we can search for different wireless networks, we can easily do so with the GUI. This is the typical way that people search and connect to wireless networks.Dostupné k zakoupeníS1 E13 – Hunting Down Networks
27. února 20188 minWant to feel like a real hacker and read the terminal like a pro? We can do that by utilizing a script that will allow us to search for wireless networks on our terminal.Dostupné k zakoupeníS1 E14 – MitM Attacks
27. února 201810 minSo we are connected to our target, what fun can we do? The first thing we are able to do is perform a MitM attack in which puts us in between 2 people talking to each other. This allows us to intercept their conversation to inquire personal information.Dostupné k zakoupeníS1 E15 – Finding Ourselves an Access Point
27. února 201816 minBut don't we already have a solid internet connection with our target? Yes, yes we do. However, our target may also be hosting a private network (Hidden SSID) that they don't want the public to know about. Wonder what is on that network?Dostupné k zakoupeníS1 E16 – Setting up Lab
27. února 20185 minBefore we crack any wireless network, we must first learn how to setup our network card to handle the requests and monitor the SSIDS.Dostupné k zakoupeníS1 E17 – Scanning WEP Networks
27. února 201813 minNow that we have our computer setup, we can start off by searching for different WEP Networks in the area. This is done by setting our wireless card to monitor status.Dostupné k zakoupeníS1 E18 – Cracking WEP Connections
27. února 20189 minBy selecting our target to hack, we can then move onto cracking their wifi password. This can be done by using either the default password dictionaries that comes with Kali, or with our own dictionary we created.Dostupné k zakoupeníS1 E19 – Intercepting Connections (URLSnarf)
27. února 20186 minBy utilizing URLSnarf, we can intercept the HTTP connection requests that are stored inside of the CFL. This will help us understand who our target is and what they do.Dostupné k zakoupeníS1 E20 – Setting up Our Lab
27. února 20185 minFirst thing is first, we need to configure our wireless network card to monitor the networks. Doing this helps us search for wireless networks in the area.Dostupné k zakoupeníS1 E21 – Scanning WPS Networks
27. února 20184 minSo our "Lab" is now setup and ready to start scanning. The first thing we will be doing is performing a -wps scan using wifite. This will allow us to scope out only the WPS encrypted networks in our area.Dostupné k zakoupeníS1 E22 – Brute Forcing WPS Connections
27. února 20185 minIt all comes down to this! We have setup our lab to monitor mode, and have scoped out our target. We have also created our own Password Dictionary files. Now we can use WIFITE with AirCrack-NG in order to brute force our way past the password.Dostupné k zakoupeníS1 E23 – Intercepting Connections (EtterCap)
27. února 20186 minCongratulations! You have now hacked your way into your target's Wi-Fi network. Now what? Well, one thing we can do is intercept their internet connections to see what they do online. We can do this by using EtterCap.Dostupné k zakoupeníS1 E24 – Setting up Our Lab
27. února 20182 minLike all great hackers, we pave the way of our setup. This means we will be using a few tools to setup our wireless card in order to monitor and record our network connections to start the hacking process.Dostupné k zakoupeníS1 E25 – Search for WPA/WPA2 Networks
27. února 20183 minWe will begin by performing a simple search using WIFITE in order to help us scan the area to select our target. By using WIFITE we are able to see a list of WPA/WPA2 enabled wireless networks within our area.Dostupné k zakoupení