Description
In this course, you will :
- Learn about the main weaknesses of WEP encryption and how to crack it.
- Understand a variety of techniques for cracking WEP, WPA, and WPA2.
- You now have access to WPA2 Enterprise networks.
- Captive portals can be exploited (eg: hotel and airport networks).
- Use the GPU to accelerate cracking.
- Have a thorough understanding of how networks work.
- Understand how devices in a network communicate with one another.
- To crack WEP encryption, launch a chopchop response attack.
- Discover nearby wireless networks.
- Collect information about wireless networks.
- Discover which devices are connected to each wifi network in range.
- Disconnect any device within range from any network.
- To crack WEP encryption, launch an interactive packet reply attack.
- To crack WEP encryption, launch a fragmentation attack.
- Discover WPA/WPA2 flaws and the theory behind cracking them.
- Use the WPS feature to crack WPA/WPA2 without the need for a wordlist or any connected clients.
- Capture the handshake and use it to launch a word list attack.
- Make your own list of words.
- Use the GPU to launch a wordlist attack.
- Use a rainbow table to launch a word list attack.
- How to defend wireless networks against cracking attacks.
- To protect your network, identify wireless network flaws.
- Configure wireless networks to defend against the aforementioned attacks.
Syllabus :
1. Preparation
- Lab Overview & Needed Software
- Initial Preparation
- Installing Kali Linux as a VM on Windows
- Installing Kali Linux as a VM on Apple Mac OS
- Installing Kali Linux as a VM on Linux
- Basic Overview Of Kali Linux
- Linux Terminal & Basic Commands
2. Network Basics
- Connecting a Wireless Adapter To Kali
- What is MAC Address & How To Change It
- Wireless Modes - Managed & Monitor Mode Explained
- Sniffing Basics - Using Airodump-ng
- WiFi Bands - 2.4Ghz & 5Ghz Frequencies
- Targeted Sniffing Using Airodump-ng
- Deauthentication Attack (Disconnecting Any Device From The Network)
- Discovering Hidden Networks
- Connecting To Hidden Networks
- Bypassing Mac Filtering (Blacklists & Whitelists)
3. WEP Cracking
- Cracking Sections Introduction
- Theory Behind Cracking WEP
- WEP Cracking - Basic Case
- Associating With Target Network Using Fake Authentication Attack
- ARP Request Reply Attack
- Chopchop Attack
- Fragmentation Attack
- Cracking SKA Networks
4. WPA/WPA2 Cracking
-
WPA Cracking - Introduction
5. WPA/WPA2 Cracking - Exploiting WPS
- WPA Cracking - Exploiting WPS Feature
- Bypassing "Failed to associate" Issue
- Bypassing 0x3 & 0x4 Errors
- WPS Lock - What Is It & How To Bypass it
- Unlocking WPS
6. WPA/WPA2 Cracking - Wordlist Attacks
- How To Capture The Handshake
- Creating a Wordlist
- Cracking Key Using A Wordlist Attack
- Saving Cracking Progress
- Using Huge Wordlists With Aircrack-ng Without Wasting Storage
- Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage
- Speeding the Cracking Process Using Rainbow Tables
- Cracking WPA/WPA2 Much Faster Using GPU
7. WPA/WPA2 Cracking - WPA/WPA2 Enterprise
- What is WPA/WPA2 Enterprise & How it Works
- How To Hack WPA/WPA2 Enterprise
- Stealing Login Credentials
- Cracking Login Credentials
8. Protection
- Securing Systems From The Above Attacks
- How to Configure Wireless Security Settings To Secure Your Network