Overview Getting Started - Linux Networking Commands - Enabling Monitor Mode - Sniffing Traffic - Sniffing from the Command Line - macchanger and Targeted Sniffing - Deauthentication / Deauth Attacks - WPA / WPA2 Password Recovery Overview - WPA / WPA2 Password Recovery Demonstration - How to Protect Against Dictionary Attacks - Using Pyrit to Speed Up Password Recovery - Reaver for WPS Pin Recovery - Hydra for Router Login - Whats is DNS Spoofing and MITM Attacks? - DNS Spoofing and MITM Attack Demo - How to Defend Against MITM Attacks - Fake Access Point Prevention
Learn moreHas discount |
![]() |
||
---|---|---|---|
Expiry period | Lifetime | ||
Made in | English | ||
Last updated at | Sun Jun 2022 | ||
Level |
|
||
Total lectures | 18 | ||
Total quizzes | 0 | ||
Total duration | 02:11:47 Hours | ||
Total enrolment |
![]() |
||
Number of reviews | 0 | ||
Avg rating |
|
||
Short description | Overview Getting Started - Linux Networking Commands - Enabling Monitor Mode - Sniffing Traffic - Sniffing from the Command Line - macchanger and Targeted Sniffing - Deauthentication / Deauth Attacks - WPA / WPA2 Password Recovery Overview - WPA / WPA2 Password Recovery Demonstration - How to Protect Against Dictionary Attacks - Using Pyrit to Speed Up Password Recovery - Reaver for WPS Pin Recovery - Hydra for Router Login - Whats is DNS Spoofing and MITM Attacks? - DNS Spoofing and MITM Attack Demo - How to Defend Against MITM Attacks - Fake Access Point Prevention | ||
Outcomes |
|
||
Requirements |
|