Kali Linux 2017 Wireless Penetration Testing for Beginners

Kali Linux 2017 Wireless Penetration Testing for Beginners

התוכן זמין לקנייה
Kali Linux is rated as the #1 security operating system for hackers. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. With this course, you'll learn to connect to a wireless network, by utilizing various tools and software programs, and hack into wireless networks.
2018עונה אחת
מתאים לכולם
27 פרקים
  • 1. The Course Overview

    1. The Course Overview

    This video provides an overview of the entire course.
    This video provides an overview of the entire course.
    מתאים לכולם
    7 דקות
    27 בפבר׳ 2018
  • 2. Wireless Network Signals

    2. Wireless Network Signals

    We will discover the methods and techniques along with some meanings behind the different wireless network signals.
    We will discover the methods and techniques along with some meanings behind the different wireless network signals.
    מתאים לכולם
    6 דקות
    27 בפבר׳ 2018
  • 3. Wi-Fi Pineapple

    3. Wi-Fi Pineapple

    While using a regular Wireless card will get us by with this course, we can take a huge advantage of the Wi-Fi Pineapple and discover some of the powers behind this amazing antenna.
    While using a regular Wireless card will get us by with this course, we can take a huge advantage of the Wi-Fi Pineapple and discover some of the powers behind this amazing antenna.
    מתאים לכולם
    2 דקות
    27 בפבר׳ 2018
  • 4. Yagi Antenna

    4. Yagi Antenna

    Is your target a little out of your wireless cards reach? With a Yagi antenna, you don't have that issue... Unless they are extremely far away. When setup properly, a Yagi antenna can reach up to 1500 kilometres away.
    Is your target a little out of your wireless cards reach? With a Yagi antenna, you don't have that issue... Unless they are extremely far away. When setup properly, a Yagi antenna can reach up to 1500 kilometres away.
    מתאים לכולם
    3 דקות
    27 בפבר׳ 2018
  • 5. Getting Used to Kali

    5. Getting Used to Kali

    Now we have seen some of these awesome tools, we have watched Mr. Robot at least 100 times, and have seen the Hackers trilogy, it is time to start learning. What better way to do that than with Kali Linux!
    Now we have seen some of these awesome tools, we have watched Mr. Robot at least 100 times, and have seen the Hackers trilogy, it is time to start learning. What better way to do that than with Kali Linux!
    מתאים לכולם
    7 דקות
    27 בפבר׳ 2018
  • 6. Creating a Password Dictionary

    6. Creating a Password Dictionary

    When we attempt to crack a password (Wireless | Server | Website | Phone | ETC.) We need Dictionary of Passwords. This will allow us to insert several different passwords in a text file and use that document later on in our arguments against our target.
    When we attempt to crack a password (Wireless | Server | Website | Phone | ETC.) We need Dictionary of Passwords. This will allow us to insert several different passwords in a text file and use that document later on in our arguments against our target.
    מתאים לכולם
    7 דקות
    27 בפבר׳ 2018
  • 7. Wireless Security Protocols

    7. Wireless Security Protocols

    We know that Wi-Fi networks are connected by either WEP/WPS/WPA/WPA2, however, do we understand those security protocols? Don't worry, in this section we will be learning about each of them.
    We know that Wi-Fi networks are connected by either WEP/WPS/WPA/WPA2, however, do we understand those security protocols? Don't worry, in this section we will be learning about each of them.
    מתאים לכולם
    4 דקות
    27 בפבר׳ 2018
  • 8. Scanning for Wireless Networks

    8. Scanning for Wireless Networks

    Alright, so we have our Kali Linux installed, and we want to connect to the internet. But we don't have any. What should we do? With Kali, we can scan to see who has internet around us.
    Alright, so we have our Kali Linux installed, and we want to connect to the internet. But we don't have any. What should we do? With Kali, we can scan to see who has internet around us.
    מתאים לכולם
    9 דקות
    27 בפבר׳ 2018
  • 9. Cracking Wi-Fi Passwords

    9. Cracking Wi-Fi Passwords

    So, we have found our target Wi-Fi, and we have built our own Password Dictionary, now what? We will now need to see if we can crack the password for our target.
    So, we have found our target Wi-Fi, and we have built our own Password Dictionary, now what? We will now need to see if we can crack the password for our target.
    מתאים לכולם
    8 דקות
    27 בפבר׳ 2018
  • 10. Hacking/Cracking Our Way into the Target

    10. Hacking/Cracking Our Way into the Target

    So, we have the password of our network SSID. Now what do we do? Simply put, we connect to the desired network the same way you would connect to your home network. Then we can start surfing the internet.
    So, we have the password of our network SSID. Now what do we do? Simply put, we connect to the desired network the same way you would connect to your home network. Then we can start surfing the internet.
    מתאים לכולם
    4 דקות
    27 בפבר׳ 2018
  • 11. Exploiting Our Target

    11. Exploiting Our Target

    Do you have a hunch about your neighbour? Anything unusual going on? After connecting to his Wi-Fi network, we can use WireShark to help us intercept his traffic to see what is going on.
    Do you have a hunch about your neighbour? Anything unusual going on? After connecting to his Wi-Fi network, we can use WireShark to help us intercept his traffic to see what is going on.
    מתאים לכולם
    7 דקות
    27 בפבר׳ 2018
  • 12. Scanning Airwaves

    12. Scanning Airwaves

    While there are a few different ways we can search for different wireless networks, we can easily do so with the GUI. This is the typical way that people search and connect to wireless networks.
    While there are a few different ways we can search for different wireless networks, we can easily do so with the GUI. This is the typical way that people search and connect to wireless networks.
    מתאים לכולם
    5 דקות
    27 בפבר׳ 2018
  • 13. Hunting Down Networks

    13. Hunting Down Networks

    Want to feel like a real hacker and read the terminal like a pro? We can do that by utilizing a script that will allow us to search for wireless networks on our terminal.
    Want to feel like a real hacker and read the terminal like a pro? We can do that by utilizing a script that will allow us to search for wireless networks on our terminal.
    מתאים לכולם
    8 דקות
    27 בפבר׳ 2018
  • 14. MitM Attacks

    14. MitM Attacks

    So we are connected to our target, what fun can we do? The first thing we are able to do is perform a MitM attack in which puts us in between 2 people talking to each other. This allows us to intercept their conversation to inquire personal information.
    So we are connected to our target, what fun can we do? The first thing we are able to do is perform a MitM attack in which puts us in between 2 people talking to each other. This allows us to intercept their conversation to inquire personal information.
    מתאים לכולם
    10 דקות
    27 בפבר׳ 2018
  • 15. Finding Ourselves an Access Point

    15. Finding Ourselves an Access Point

    But don't we already have a solid internet connection with our target? Yes, yes we do. However, our target may also be hosting a private network (Hidden SSID) that they don't want the public to know about. Wonder what is on that network?
    But don't we already have a solid internet connection with our target? Yes, yes we do. However, our target may also be hosting a private network (Hidden SSID) that they don't want the public to know about. Wonder what is on that network?
    מתאים לכולם
    16 דקות
    27 בפבר׳ 2018
  • 16. Setting up Lab

    16. Setting up Lab

    Before we crack any wireless network, we must first learn how to setup our network card to handle the requests and monitor the SSIDS.
    Before we crack any wireless network, we must first learn how to setup our network card to handle the requests and monitor the SSIDS.
    מתאים לכולם
    5 דקות
    27 בפבר׳ 2018
  • 17. Scanning WEP Networks

    17. Scanning WEP Networks

    Now that we have our computer setup, we can start off by searching for different WEP Networks in the area. This is done by setting our wireless card to monitor status.
    Now that we have our computer setup, we can start off by searching for different WEP Networks in the area. This is done by setting our wireless card to monitor status.
    מתאים לכולם
    13 דקות
    27 בפבר׳ 2018
  • 18. Cracking WEP Connections

    18. Cracking WEP Connections

    By selecting our target to hack, we can then move onto cracking their wifi password. This can be done by using either the default password dictionaries that comes with Kali, or with our own dictionary we created.
    By selecting our target to hack, we can then move onto cracking their wifi password. This can be done by using either the default password dictionaries that comes with Kali, or with our own dictionary we created.
    מתאים לכולם
    9 דקות
    27 בפבר׳ 2018
  • 19. Intercepting Connections (URLSnarf)

    19. Intercepting Connections (URLSnarf)

    By utilizing URLSnarf, we can intercept the HTTP connection requests that are stored inside of the CFL. This will help us understand who our target is and what they do.
    By utilizing URLSnarf, we can intercept the HTTP connection requests that are stored inside of the CFL. This will help us understand who our target is and what they do.
    מתאים לכולם
    6 דקות
    27 בפבר׳ 2018
  • 20. Setting up Our Lab

    20. Setting up Our Lab

    First thing is first, we need to configure our wireless network card to monitor the networks. Doing this helps us search for wireless networks in the area.
    First thing is first, we need to configure our wireless network card to monitor the networks. Doing this helps us search for wireless networks in the area.
    מתאים לכולם
    5 דקות
    27 בפבר׳ 2018
  • 21. Scanning WPS Networks

    21. Scanning WPS Networks

    So our "Lab" is now setup and ready to start scanning. The first thing we will be doing is performing a -wps scan using wifite. This will allow us to scope out only the WPS encrypted networks in our area.
    So our "Lab" is now setup and ready to start scanning. The first thing we will be doing is performing a -wps scan using wifite. This will allow us to scope out only the WPS encrypted networks in our area.
    מתאים לכולם
    4 דקות
    27 בפבר׳ 2018
  • 22. Brute Forcing WPS Connections

    22. Brute Forcing WPS Connections

    It all comes down to this! We have setup our lab to monitor mode, and have scoped out our target. We have also created our own Password Dictionary files. Now we can use WIFITE with AirCrack-NG in order to brute force our way past the password.
    It all comes down to this! We have setup our lab to monitor mode, and have scoped out our target. We have also created our own Password Dictionary files. Now we can use WIFITE with AirCrack-NG in order to brute force our way past the password.
    מתאים לכולם
    5 דקות
    27 בפבר׳ 2018
  • 23. Intercepting Connections (EtterCap)

    23. Intercepting Connections (EtterCap)

    Congratulations! You have now hacked your way into your target's Wi-Fi network. Now what? Well, one thing we can do is intercept their internet connections to see what they do online. We can do this by using EtterCap.
    Congratulations! You have now hacked your way into your target's Wi-Fi network. Now what? Well, one thing we can do is intercept their internet connections to see what they do online. We can do this by using EtterCap.
    מתאים לכולם
    6 דקות
    27 בפבר׳ 2018
  • 24. Setting up Our Lab

    24. Setting up Our Lab

    Like all great hackers, we pave the way of our setup. This means we will be using a few tools to setup our wireless card in order to monitor and record our network connections to start the hacking process.
    Like all great hackers, we pave the way of our setup. This means we will be using a few tools to setup our wireless card in order to monitor and record our network connections to start the hacking process.
    מתאים לכולם
    2 דקות
    27 בפבר׳ 2018
  • Kali Linux 2017 Wireless Penetration Testing for Beginners
    2018עונה אחת
    Kali Linux is rated as the #1 security operating system for hackers. With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. With this course, you'll learn to connect to a wireless network, by utilizing various tools and software programs, and hack into wireless networks.
    יוצרים וצוות שחקנים
    השחקנים
    Aubrey Love, Vijay Kumar Velu
    אולפן
    Packt Publishing
    ביקורות
    4.2 out of 5 stars

    6 דירוגים משאר העולם

    1. 5 star
      57%
    2. 4 star
      28%
    3. 3 star
      0%
    4. 2 star
      15%
    5. 1 star
      0%
    שפות שמע
    English
    כתוביות
    English [CC]
    הזמנה או צפייה בתוכן מהווה הסכמה לתנאים שלנו. נמכר על-ידי Amazon.com Services LLC.‎

    משוב