Autoplay
Autocomplete
Previous Lesson
Complete and Continue
WiFi Attacks Specialist
Welcome
Before We Begin
Requirements
Optional Real-World Hardware
Module 1 - IEEE
What Is IEEE?
IEEE 802.11 Standard
IEEE 802.11 Covered Protocols
Module 2 - Wireless Networking 101
Operating Modes
Module 3 - Antennas
Omnidirectional
Directional
Module 4 - Wireless Packets
MAC Frame
Management Frames
Control Frames
Module 5 - Tooling
Preparing Your Adapter
The Aircrack-NG Suite
Reaver
Rogue
Module 6 - Wired Equivalent Privacy
What is WEP?
Attacking WEP with Open Authentication
Attacking WEP with Shared Key Authentication
Demo (2:24)
Module 7 - Personal WPA
What is personal WPA?
What is a Pre-Shared Key?
Attacking Personal WPA
Capturing Traffic
Coercing Re-Authentication
Cracking the 4-way Handshake
Demo (2:07)
Module 8 - Rogue Access Points
The 4-Way Handshake Recap
Capturing Traffic
Configuring Our Rogue AP
Obtaining The Handshake
Cracking The Partial Handshake
Demo (3:03)
Module 9 - Wi-Fi Protected Setup
What is WPS?
Attacking WPS 1.0
Pixie-Dust Attack
Module 10 - Enterprise Wi-Fi Protected Access
What is Enterprise WPA
EAP-TLS
EAP-PEAP
EAP-TTLS
Locating Our Target
Configuring the Evil Twin
Obtaining The Hash
Demo (3:30)
Module 11 - Wi-Fi Protected Access 3
WPA3 Improvements
Attacking Transition Mode
Module 13 - Protective Configurations
Unmasking Hidden SSIDs
Defeating MAC Address Filtering
Module 14 - Automation
Wifite2
Bonus Content
Private Discord Community
Private Discord Community
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock