Wifi Penetration

Beginner 0(0 Ratings) 0 Students enrolled English
Created by skill expert
Last updated Tue, 17-May-2022
+ View more
Course overview

It’s a unique form of pen testing that combines both physical and virtual elements to analyze one of the most vulnerable areas of 

your overall cybersecurity.


 This guide will walk through exactly how you should conduct a wireless pen test, or how a contracted agency (like us) would go 

about conducting one. That way, you know how to carry out the procedure yourself, or what to expect when hiring professional help.

Steps to Execute Wireless Pen Testing

 A wireless pen test functions just like any other variety of pen test (see below). It differs simply in the focus of its analysis,

which is aimed more at wifi network connectivity than any other vector of attack, such as web applications. Executing any pen test 

requires gathering information, launching an attack, then reporting on the findings.

 For a wireless test in particular, the process breaks down into the following six steps:

 1.Reconnaissance

 2.Identifying networks

 3.Investigating vulnerabilities

 4.Exploiting the wireless networks

 5.Reporting on results of exploitation

 6.Crafting a plan for strengthening security

9 Popular WiFi Penetration Testing Tools Hackers Use in 2021

 1.Aircrack

 2.Reaver

 3.Airsnort

 4.Cain & Abel

 5.Infernal Twin

 6.Wireshark

 7.Wifiphisher

 8.CowPatty

 9.OmniPeek

Curriculum for this course
22 Lessons 01:51:15 Hours
Wifi
15 Lessons 01:16:57 Hours
  • Introduction
    Preview 00:03:25
  • Networks Basics
    00:03:09
  • What is MAC Address _ How To Change It
    00:04:44
  • Wireless Modes - Managed _ Monitor Mode Explained
    00:04:12
  • packet Sniffing Basics
    00:05:40
  • Targeted Sniffing
    00:07:27
  • Deauthentication Attack
    00:05:17
  • Cracking Sections Introduction
    00:01:21
  • Theory Behind Cracking WEP
    00:03:26
  • WEP Cracking - Basic Case
    00:06:27
  • WEP Cracking - Fake Authentication
    00:06:10
  • WEP Cracking - ARP Request Reply Attack
    00:04:44
  • WEP Cracking - Chopchop Attack
    00:08:28
  • WEP Cracking - Fragmentation Attack
    00:07:44
  • How To Capture The Handshake
    00:04:43
WPA Cracking
7 Lessons 00:34:18 Hours
  • Introduction
    00:02:03
  • Exploiting WPS Feature
    00:07:17
  • Theory Behind Cracking WPAWPA2
    00:02:18
  • Creating a Wordlist
    00:06:08
  • Cracking Key Using A Wordlist Attack
    00:03:04
  • Speeding the Cracking Process Using Rainbow Tables
    00:07:00
  • Even Quicker Cracking Using GPU
    00:06:28
+ View more
Other related courses
18:07:04 Hours
Updated Tue, 17-May-2022
0 1 Free
01:43:29 Hours
0 1 Free
15:06:52 Hours
Updated Wed, 08-Jun-2022
0 0 Free
14:55:05 Hours
Updated Wed, 08-Jun-2022
0 0 Free
About instructor

skill expert

0 Reviews | 18 Students | 467 Courses
Student feedback
0
0 Reviews
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Reviews

Free
Includes: