O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

Video Description

46+ Videos to teach you how to hack and secure Wi-Fi (WEP, WPA, WPA2, WPA/WPA2 Enterprise)

About This Video

  • You will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks, as well as a number of attacks that you can launch without the need to know the password such as controlling all the connections around you.

In Detail

You will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks, as well as a number of attacks that you can launch without the need to know the password such as controlling all the connections around you.

Table of Contents

  1. Chapter 1 : Introduction
    1. Introduction 00:03:26
  2. Chapter 2 : Preparation
    1. Installing Kali Linux 2018.1 as a Virtual Machine 00:08:31
    2. Basic Overview of Kali Linux 00:07:06
  3. Chapter 3 : Network Basics
    1. Networks Basics 00:03:09
    2. Connecting a Wireless Adapter To Kali 00:07:18
    3. What is MAC Address & How To Change It 00:04:31
    4. Wireless Modes - Managed & Monitor Mode Explained 00:05:03
    5. Enabling Monitor Mode Manually (2nd method) 00:02:37
    6. Enabling Monitor Mode Using airmon-ng (3rd method) 00:03:17
    7. Sniffing Basics - Using Airodump-ng 00:05:17
    8. Targeted Sniffing Using Airodump-ng 00:07:02
    9. Deauthentication Attack (Disconnecting Any Device From The Network) 00:04:52
    10. Discovering Hidden Networks 00:08:12
    11. Connecting To Hidden Networks 00:05:14
    12. Bypassing Mac Filtering (Blacklists & Whitelists) 00:09:04
  4. Chapter 4 : WEP Cracking
    1. Cracking Sections Introduction 00:01:22
    2. Theory Behind Cracking WEP 00:03:04
    3. WEP Cracking - Basic Case 00:05:34
    4. Associating With Target Network Using Fake Authentication Attack 00:06:10
    5. ARP Request Reply Attack 00:04:45
    6. Chopchop Attack 00:08:29
    7. Fragmentation Attack 00:07:44
    8. Cracking SKA Networks 00:09:05
  5. Chapter 5 : WPA/WPA2 Cracking
    1. WPA Cracking – Introduction 00:01:57
  6. Chapter 6 : WPA/WPA2 Cracking - Exploiting WPS
    1. WPA Cracking - Exploiting WPS Feature 00:06:43
    2. Bypassing “Failed to associate” Issue 00:07:40
    3. Bypassing 0x3 & 0x4 Errors 00:07:40
    4. WPS Lock - What Is It & How To Bypass it 00:07:02
    5. Unlocking WPS 00:08:41
  7. Chapter 7 : WPA/WPA2 Cracking - Wordlist Attacks
    1. Theory Behind Cracking WPA/WPA2 00:02:16
    2. How To Capture The Handshake 00:04:29
    3. Creating a Wordlist 00:05:32
    4. Cracking Key Using A Wordlist Attack 00:02:49
    5. Saving Cracking Progress 00:09:44
    6. Using Huge Wordlists With Aircrack-ng Without Wasting Storage 00:07:35
    7. Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 00:10:05
    8. Speeding the Cracking Process Using Rainbow Tables 00:07:01
    9. Cracking WPA/WPA2 Much Faster Using GPU - Part 1 00:07:20
    10. Cracking WPA/WPA2 Much Faster Using GPU - Part 2 00:10:39
  8. Chapter 8 : WPA/WPA2 Cracking - WPA/WPA2 Enterprise
    1. What is WPA/WPA2 Enterprise & How it Works 00:05:25
    2. How To Hack WPA/WPA2 Enterprise 00:06:48
    3. Stealing Login Credentials 00:08:11
    4. Cracking Login Credentials 00:06:38
  9. Chapter 9 : Protection
    1. Securing Systems From The Above Attacks 00:04:59
    2. How to Configure Wireless Security Settings To Secure Your Network 00:06:25