Video description
In this course, you will learn how to set up your Kali Linux lab environment properly. In addition to that, you will learn how devices communicate with each other. Lastly, you will learn the best out of this course, which is Man in the Middle attacks.
This course is divided into six sections:
- Preparation: In this section, you will learn how to download and set up the latest version of Kali Linux as a virtual machine or as your main OS. This helps you create your own safe hacking lab environment.
- Network basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing.
- Gather AP information before cracking: In this section, you will learn how you can enumerate the target access point such as ESSID-BSSID-Channel-Encryption type, and so on. You will learn how you can disconnect, kick any client from your target network, or even jam the wireless access point completely without having its password.
- Cracking WEP/WPA/WPA2 encryption: After gathering information about the target access point, it’s time to learn how to crack WEP/WPA/WPA2 encryption keys and the theory behind each attack.
- MITM attack: In this section, you will learn how to perform man-in-the-middle attacks and what post-modules can be carried out on the target OS. Modules such as playing music on the target OS, stealing credentials, and many more. You will even learn how to gain full access to the connected devices.
- Protecting yourself against these attacks: After learning MITM attacks, it’s time to learn how to protect your OS against all the previously mentioned attacks.
By the end of the course, you will be able to perform MITM attack on the target network and fully control all the connected computers. You will be able to protect yourself from the MITM attack.
What You Will Learn
- Learn to set up your Kali Linux environment
- Dealing with a lot of Kali Linux tools
- Carry out several attacks without having the key
- Gain access to any client account in the Wi-Fi network
- Launch Man in the Middle attack
- Learn the basics of the network
Audience
This course is intended for beginners and professionals. If you are a beginner, you will start from scratch until you become a professional, and if you are a professional, this course will enhance and refresh your knowledge about wireless network hacking. This course is for people who want to do penetration testing against a specific Wi-Fi network.
About The Author
Saad Sarraj: Saad Sarraj is passionate cybersecurity and ethical hacking/penetration testing professional. He is also a TryHackMe Top 1% CTF Player.
He has created courses to share what he has learned. He tries to make videos in a very simple way so that everyone learning penetration testing/cybersecurity gets the advantage and understands easily.
He owns a YouTube channel called CyberSudo that focuses on cybersecurity and penetration testing. It also contains some videos from the courses.
Table of contents
- Chapter 1 : Introduction
-
Chapter 2 : Preparation
- Set Up Kali Linux as Your Main OS
- Set Up Kali as a Virtual Machine (VirtualBox)
- Set Up Kali Linux as a Virtual Machine (VMware)
- Configure NAT Network in VirtualBox
- Enhance Your Virtual Machine Performance
- Taking Snapshots of Virtual Machines
- Set Up Windows as a Virtual Machine
- Connecting Wi-Fi Card to the Virtual Machine
- Updating Kali Linux
- Chapter 3 : Networks Basics
- Chapter 4 : Gather AP Information Before Cracking
- Chapter 5 : Cracking WEP Encryption
-
Chapter 6 : Cracking WEP/WEP2 Encryptions
- Cracking WPA/WPA2 Encryption Explain
- Cracking WPA/WPA2 Encryption Methods
- Cracking WPA/WPA2 Using the WPS Feature
- Capturing the Handshake
- Creating a Wordlist
- Cracking WPA/WPA2 Using Dictionary Attack
- Cracking WPA/WPA2 Using Brute Force Attack
- Cracking WPA/WPA2 Using Rainbow Table
- Cracking WPA/WPA2 Using Hashcat (GPU)
- Cracking WPA/WPA2 Using Evil Twin Attack
- Getting the Username and Password of the Target Router
- Chapter 7 : Hacking WPA-Enterprise Wi-Fi Networks
-
Chapter 8 : Man in the Middle Attacks
- Introduction
- Man in the Middle Attack Explained
- Gathering Information about Connected Clients
- Gather Detailed Information about the Clients
- MITM Attack Using (ARPspoof)
- Capturing Login Credentials
- Bypassing SSL Certificate
- Redirect Any Client to Any Website
- Stealing the Cookies
- Capturing a Screenshot from the Target Browser
- Injecting a keylogger into the target webpage
- Capturing Images from Network Traffic
- Injecting HTML File and Flipping the Images in the Target Browser
- Injecting JavaScript URL and Hooking the Clients with BeEF
- Stealing the Target Accounts with BeEF
- Having Fun with BeEF
- Chapter 9 : Fully Accessing the Connected Devices
- Chapter 10 : Protect Your Wi-Fi Network from All the Previous Attacks
- Chapter 11 : Extras
Product information
- Title: Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
- Author(s):
- Release date: February 2022
- Publisher(s): Packt Publishing
- ISBN: 9781803239750
You might also like
book
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud …
video
Hands-On Network Scanning with Nmap for Network Security
Do you want to enhance your organization’s network security? Are you worried about what could happen …
book
Learn Kali Linux 2019
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing …
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …