Video description
This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks.
What You Will Learn
- How to conduct basic penetration testing on Wireless Networks.
- How to determine the secret password used by WEP, WPA, and WPA2 networks.
- How to change your MAC address and impersonate other devices on a wireless network.
- How to use the Aircrack-Ng toolkit
Audience
Anyone who is interested in understanding the vulnerabilities in wireless security standards such as WEP, WPA, and WPA2. Anyone who wants to learn how to conduct wireless network hacking as part of a penetration test
About The Author
Jason Dion: Jason Dion, CISSP No. 349867, is an adjunct instructor at Liberty University's College of Engineering and Computational Science and Anne Arundel Community College's Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, and Information Technology Infrastructure Library v3. He has been a deputy director of a network operations center, and an information systems officer for large organizations around the globe.
Table of contents
- Chapter 1 : Welcome to Wireless (Wi-Fi) Network Hacking
- Chapter 2 : Configuring Wi-Fi Hacking Tools
- Chapter 3 : Setting Up Your Wireless Access Points
- Chapter 4 : Wireless Networking Concepts
- Chapter 5 : Wired Equivalent Privacy (WEP)
- Chapter 6 : Wi-Fi Protected Access (WPA/WPA2)
- Chapter 7 : Wi-Fi Protected Setup (WPS)
- Chapter 8 : Conclusion
Product information
- Title: WiFi Hacking: Wireless Penetration Testing for Beginners
- Author(s):
- Release date: May 2018
- Publisher(s): Packt Publishing
- ISBN: 9781789530193
You might also like
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …
video
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)
More Than 5 Hours of Video Instruction More than 5 hours of video instruction to help …
video
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
In this course, you will learn how to set up your Kali Linux lab environment properly. …
book
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, …