Udemy - Wi-Fi Hacking: A Step by Step Guide to Wireless Hacking
Since the introduction of Wireless Networks, the number of people switching to a Wireless Network have increased at a rapid rate! It is believed that these Wireless Networks are designed as a secure solution but that is not the case. These networks are as vulnerable as any other network are!
Description
After the successful completion of this course you will be able to:
Understand what makes a Wireless Network vulnerable.
Learn about different Attack Vectors.
Get familiar with concepts such as WAP, WEP, WPS, SSID.
Understand how to Bypass WLAN Authentication.
Para quem é este curso:
- Anyone who is curious to learn about Wireless Networks and Wireless Hacking!
Course content
- Introduction
- Introduction to Wireless Network
- Wireless Network
- What is Wireless Network
- Types of Wireless Networks
- Benefits of Wireless Network
- Disadvantages of Wireless Technology
- Basic Concept
- Basic Concepts and Wireless Access Point
- Bands and Channel
- Data Frames
- Management Frame
- Packets and SSID
- BSSID and ESSID
- Wireless Attack Scenarios
- Packet Injection and Demo
- Packet Sniffing and Demo
- Bypassing WLAN Authentication
- Hidden SSID and Demo
- Unmasking Hidden SSID and Demo
- MAC Filtering and Demo
- Grabbing MAC Address
- WEP
- What is WEP
- Vulnerability in WEP
- Cracking WEP
- Countermeasures of Cracking WEP
- Pawning Beacon Frames
- Demo Pawning Beacons and Demo and Deauth
- WPA
- Goals of WPA
- Modes of WPA
- WPA 2 WiFi Encryption and Demo
- DEMOs Cracking WPA and WPA2
- Vulnerabilities in WPA and WPA 2
- WPS
- WPS WiFi Protected Setup
- Vulnerabilities in WPS
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.