Learn Hacking WiFi Networks Using Kali Linux 2.0

Saad Sarraj, Ethical Hacker, IT Expert

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
23 Videos (1h 27m)
    • Course introduction

      1:25
    • Installing Kali Linux 2.0 as ISO file

      9:04
    • Installing Kali Linux 2.0 using as virtual machine

      2:37
    • Connecting WiFi Card to the virtual machine

      2:16
    • Gather AP information introduction

      1:22
    • Updating Kali LInux 2.0

      1:35
    • Network Basic theory

      2:36
    • What is the Mac address and how you can change it

      5:23
    • Enabling monitor mode on WiFi card

      5:29
    • Gather AP information introduction

      1:22
    • Capturing packets around us using airodump-ng

      2:42
    • Capturing specific network packets using airodump-ng

      3:19
    • Cracking WEP encryption explain

      2:16
    • Cracking WEP encryption methods

      1:39
    • Fake authentication with the target network

      4:24
    • Cracking WEP using ARP Request Replay Attack

      7:15
    • Cracking WPA WPA2 encryption explain

      1:12
    • Cracking WPA WPA2 encryption methods

      1:40
    • Cracking WPA WPA2 using WPS feature

      6:38
    • Capturing the Handshake

      4:20
    • Creating a Wordlist

      5:55
    • Cracking WPA WPA2 using dictionary attack

      5:17
    • Protect your WiFi AP againsst all of the previous attacks

      7:39

About This Class

in this course you will start as a beginner without any previous knowledge about the hacking , this course focuses on the practical side more than the theoretical side .

 In this course you will learn how to set up your Kali Linux Environment properly and it's going to be Kali Linux 2.0 which is the newest version of offensive security Organization , then you will learn how the Devices communicate with each other, then you will go through the theory behind each method behind cracking WEP and WPA2 encryption because this will help you to understand what's happening in the real world, then you will move to learn how to crack WEP/WPA2 key using more than method, so if the first method didn't  work with you, you can try another one, after that you'll learn how to prevent your WiFi Access Point against any attack .

This course is intended for beginners and professionals , if you are a beginner you will start from zero until you become a professional , and if you are a professional so this course will give you an additional information.

This course is divided to six parts :

  1. Preparation: In this section you will learn how to download and setup Kali Linux 2.0 properly as a virtual machine, and how you can update it , this will help you to create your safe Environment to do Penetration Testing .
  2. Network Basics: here you will learn the basics of networks that will help you to understand what you should do before network security testing .
  3. Gather AP information Before Cracking : Here you'll learn how you can Gather information about the target Access Point before cracking the password such as (ESSID-BSSID-Channel-Encryption type, etc......)  because as you know you can't hack any thing without having much information about the target , and how we can disconnect  any client from the network or even jam the target AP without having the password.
  4. Cracking WEP/WPA/WPA2 Encryption :  After gathering information about the target Access Point now you'll move to learn how you to Crack the key of  WEP/WPA/WPA2 encryption type and the theory behind each method.
  5. Protecting yourself against all of these attacks: after learning these attacks, now it's time to learn how to protect your WiFi access point from these attacks and this is by changing some configuration settings in your router. 

My Recommendation is these WiFi Cards:

  • Atheros AR9271 chipset
  • Ralink RT3070
  • Realtek RTL8187L

Notes: 

  •  You must practice what you learned to become an advanced level , because this course is focuses on practical side. 
  • This course is going to be always up to date.
  • This course is only for ethical purposes.
  • If you have any question or any problem you can send a message to us or comment.
  • After finishing this course you will get a certificate from Udemy.
  • All the people who enrolled in this course will get discounts for future courses.
  • All the Rights are Reserved to iSecurityPro no other Organization is involved.

81

Students

1

Project

Saad Sarraj

Ethical Hacker, IT Expert

My Name is Saad Sarraj , i am a young Ethical Hacker who is trying to keep the things secure.I have a very good Experience in penetration testing and Ethical Hacking, i started in this field since 2012 , then i have created my own website (iSecurityPro) and started making videos on my YouTube channel which includes many tips and tricks about Linux OS and Windows OS , i am always focusing on the practical side in producing videos and also the theory behind every single attack , and i am tryin...

See full profile