06-23-2023, 12:24 PM
The Ultimate Wireless Penetration Testing Training Course
Published 6/2023
Created by Martin Voelk
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 22 Lectures ( 3h 13m ) | Size: 1.54 GB
Full Course on Ethical Hacking and Penetration Testing of Wi-Fi Networks. Become an expert Wireless Penetration Tester!
What you'll learn
Wireless vulnerabilities
Wireless Penetration Testing
Become a Wireless Penetration Tester
Hours of Ethical Hacking & Security videos
Wifi Basics and Terminologies
Wifi Antennas
Wifi Frames
Wifi Frequencies
Wifi Scanning
Wifisweep tool
WEP
WPA
WPA2
Aircrack-NG Suite
airmon-ng
airodump-ng
aireplay-ng
aircrack-ng
MAC lookup
Attacking WEP
Using Wifite
Attacking WPA/WPA2
Wireless de-authentication
Capture the handshake hash
Crack the handshake hash
PMKID Attack
hcxdumptool
hcxpcapngtool
hashcat
Wireless DoS attacks
Attacking WPS, Bully, Reaver, Wash
Evil Twin and Social Engineering attacks
Wifiphisher
Wifi Pineapple
Automation
Bettercap
wigle
Advanced tools
Requirements
Basic IT Skills
Basic understanding of Wireless technology
Kali Linux (either in virtual machine, raspberry PI etc.)
Computer with a minimum of 4GB ram/memory
Operating System: Windows / Apple Mac OS / Linux
External Wireless Adapter which supports injection (i.e. Alfa)
Either VMware workstation, Oracle Virtual box, Raspberry PI or dedicated machine
Description
Welcome to the Ultimate Wireless Penetration Testing / Ethical Hacking course.Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.In this course Martin walks students through a step-by-step methodology on how to uncover find and exploit wireless vulnerabilities. The theoretical lectures are being complimented with the relevant lab exercises to reinforce the knowledge. Martin is not just inserting the payload or uses automated scripts but explains each step on finding the vulnerability and why it can be exploited in a certain way. The videos are easy to follow along and replicate. This training is highly recommended for anyone who wants to become a professional Wireless Penetration Tester.Course outline:1. Introduction2. Wireless Basics and Terminologies3. Wireless Security Protocols4. Aircrack-NG Suite and setting up5. Attacking WEP6. Attacking WPA/WPA27. PMKID Attacks8. DoS Attacks9. WPS Attacks10. Evil Twin and Social Engineering Attacks11. Automate Attacks12. Advanced ToolsNotes & DisclaimerIn order to replicate the labs, you will need a laptop with a virtual installation of Kali Linux (VMWare, Virtualbox etc.) or a physical machine with Kali or a Raspberry PI with Kali. Additionally, you will need an external Antenna which supports injection. We recommend the Alfa series (e.g. Alfa AC1900 WiFi adapter). Lastly you need an Access Point you own or have permission to attack.
Who this course is for
Anybody interested in ethical wireless hacking / wireless penetration testing
Anybody interested in learning how hackers hack wireless networks
Anyone interested in wireless security
Anyone interested in Red teaming
Anyone interested in offensive security
HOMEPAGE
DOWNLOAD