In this course you will start as a beginner with no previous knowledge about
penetration testing. The course is structured in a way that will take you through the
basics of networking and how clients communicate with each other, then we will start
talking about how we can exploit this method of communication to carry out a number
of powerful attacks.
What am I going to get from this course?
- Over 22 lectures and 2 hours of content!
- Have a good understanding of how networks operate
- Understand how devices communicate with each other in a netowrk
- Discover wireless networks within range
- Gather information about wifi networks
- Discover connected devices to each wifi network within range
- Disconnect any device from any network within range
- Learn the main weaknesses of WEP encryption and how it can be cracked
- Launch interactive packet reply attack to crack WEP encryption
- Launch chopchop reply attack to crack WEP encryption
- Launch fragmentation attack to crack WEP encryption
- Learn WPA/WPA2 weakness and the theory behind cracking it
- Exploit WPS feature to crack WPA/WPA2 without a wordlist and without the need to any connected clients
- Capture handshake and launch word list attack
- Create your own wordlist
- Launch a wordlist attack using the GPU
- Launch a word list attack using a rainbow table
What is the target audience?
Anybody who is interested in learning about network penetration testing
Topics include:
- SECTION 1: Network Basics
- Networks Basics
- What is MAC Address & How To Change It
- Wireless Modes - Managed & Monitor Mode Explained
- Sniffing Basics - Using Airodump-ng
- Targeted Sniffing
- Deauthentication Attack
- SECTION 2: WEP Cracking
- Theory Behind Cracking WEP
- WEP Cracking - Basic Case
- WEP Cracking - Fake Authentication
- WEP Cracking - ARP Request Reply Attack
- WEP Cracking - Chopchop Attack
- WEP Cracking - Fragmentation Attack
- SECTION 3: WPA/WPA2 Cracking
- WPA Cracking - Introduction
- WPA Cracking - Exploiting WPS Feature
- WPA Cracking - Theory Behind Cracking WPA/WPA2
- WPA Cracking - How To Capture The Handshake
- WPA Cracking - Creating a Wordlist
- WPA Cracking - Cracking Key Using A Wordlist Attack
- WPA Cracking - Speeding the Cracking Process Using Rainbow Tables
No comments:
Post a Comment