O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

WiFi Hacking: Wireless Penetration Testing for Beginners

Video Description

A Complete Guide to Hacking WiFi (WEP, WPA, and WPA2) Wireless Security and How to Exploit (Pentest) Their Vulnerabilities!

About This Video

  • Great course. Step by step instructions.
  • Good quality audio and video lectures.
  • Easy to understand instructor - he explains everything in detail.

In Detail

This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks.

Table of Contents

  1. Chapter 1 : Welcome to Wireless (Wi-Fi) Network Hacking
    1. Welcome and Course Overview 00:01:05
    2. Required Equipment for Wireless Hacking 00:02:56
  2. Chapter 2 : Configuring Wi-Fi Hacking Tools
    1. Installing Virtual Box 00:02:00
    2. Installing Kali Linux in a VirtualBox 00:06:13
    3. Updating Kali Linux to the Latest Software 00:02:51
    4. Setup the USB Wi-Fi Card with Kali Linux 00:01:37
  3. Chapter 3 : Setting Up Your Wireless Access Points
    1. Configuring Wireless Equivalent Privacy (WEP) on the Access Point 00:03:12
    2. Configuring Wi-Fi Protected Access v2 (WPA2) on the Access Point 00:03:59
  4. Chapter 4 : Wireless Networking Concepts
    1. Types of Wireless Networks 00:03:39
    2. Concealing Your MAC Address 00:02:37
    3. Changing Your MAC Address to Impersonate Other Users 00:04:16
    4. What is Promiscuous Mode? 00:01:28
    5. Setting Up Promiscuous Mode (1st Method) 00:04:11
    6. Setting Up Promiscuous Mode (2nd Method) 00:01:11
    7. Introduction to Airodump-ng 00:02:29
    8. Gathering Wireless (Wi-Fi) Information with Airodump-ng 00:05:24
  5. Chapter 5 : Wired Equivalent Privacy (WEP)
    1. Wired Equivalent Privacy (WEP) 00:02:59
    2. How to Hack WEP 00:02:08
    3. Hacking WEP Using the Fake Authentication and ARP Replay Attacks 00:07:29
    4. Connect to a Wi-Fi Network in Kali Linux Using the WEP Key We Found 00:02:02
  6. Chapter 6 : Wi-Fi Protected Access (WPA/WPA2)
    1. Wi-Fi Protected Access (WPA/WPA2) 00:03:16
    2. Brute Force Attacks 00:03:31
    3. Dictionary Attacks 00:02:58
    4. Downloading and Using Pre-made Dictionaries 00:04:08
    5. Creating Your Own Dictionary 00:02:13
    6. Hacking WPA/WPA2 with a Dictionary Attack 00:06:45
  7. Chapter 7 : Wi-Fi Protected Setup (WPS)
    1. Wi-Fi Protected Setup (WPS) 00:02:34
    2. Attacking the WPS Configured Network 00:09:24
  8. Chapter 8 : Conclusion
    1. Conclusion 00:02:31
    2. BONUS: Where to go from here 00:01:55