Course Overview
In this course, you are going to start as a beginner without any previous knowledge about hacking. This time, we will use the Raspberry Pi instead of our PC/Laptop for hacking. We will start by setting up the Raspberry Pi and end with using it to carry out various attacks like Wi-Fi, Windows, Linux, macOS hacking.
This course is intended to be for beginners and professionals. If you are a beginner, you will start from zero until you become an expert, and if you are a professional, this course will level up your knowledge about hacking.
In this course, you'll learn how Black Hat Hackers use Raspberry Pi to implement remotely advanced hacking techniques to Crack WEP/WPA2 Wi-Fi encryption keys and Compromise Windows, Linux, and OSX operating systems set up the Raspberry Pi 3,4/Raspberry Pi zero as hacking hardware.Â
The Requirements:
- Basic IT skills
- PC/Laptop
- Raspberry Pi 3 & Zero
- ALFA AWUS036ACH & AWUSO36NH
The Recommended Wi-Fi Chipsets:
- RTL8812AU (supports 5/2.4Ghz)
- Atheros AR9271 (supports 2.4Ghz)
Note: This course is for educational purposes only.
Course Overview
Course Curriculum - 8.5 Hours
- Introduction (0:53)
- What is Raspberry Pi? (1:45)
- Raspberry Pi Review (4:34)
- The Required Hardware (3:22)
- Install Kali Linux on Raspberry Pi (2:58)
- Enable SSH on Raspberry Pi (8:22)
- Connect to Raspberry Pi via SSH (6:30)
- Fix the Capacity issue on Raspberry Pi (5:00)
- Install all Kali Linux Tools (4:27)
- Change the Default Password (5:29)
- Set a Static IP Address (7:45)
- Connect to any Wi-Fi Network using Terminal (6:45)
- Automatically Connect the Raspberry Pi to a Wi-Fi Network (10:29)
- Install LCD Display on Raspberry Pi (6:27)
- Introduction (2:11)
- Attack Explained (0:55)
- Capture the Handshake (4:19)
- Generate a Wordlist [Dictionary] (8:48)
- Generating a Wordlist in Windows + Online Wordlists (8:44)
- Crack the Key using Aircrack-ng (Basic) (7:47)
- Crack the Key using a PC (CPU Method) (5:37)
- Crack the Key Much Faster using a GPU (6:16)
- Post Exploitation - Introduction (1:56)
- Privilege Escalation to Administrator (6:26)
- Maintaing Access [Persistence] (9:32)
- Spying - Capturing Key Strikes + Taking Screenshots (3:04)
- Spying - Taking Webcam Shots + View the Clipboard Content (4:05)
- Upgrade to Meterpreter Shell (4:36)
- Extra Modules (6:43)
- Maintaining Access - Persistence (Linux) (4:07)
- Privileges Escalation (Mac OSX) (3:14)
- Maintaing Access - Persistence (Mac OSX) (3:45)
- Spying - Taking Webcam Shots + Accessing Mic (4:27)
- Control the Target Desktop remotely + Taking Screenshots (4:35)
- Scanning the Target Network (3:25)
- Dump the Browser History (7:41)
- Extra Modules (7:34)
This Course is Divided into Eleven Sections:
Configure Raspberry Pi: In this section, you'll learn what Raspberry Pi is and what it is used for. This section focuses on configuring Raspberry Pi to run Kali Linux properly. It also covers issues that you may face during Raspberry Pi setup. You'll also learn how to set up an LCD for your Raspberry Pi 3.
Connecting to Raspberry Pi: After learning how to configure and deal with Raspberry Pi 3, in this section, you'll learn multiple ways to connect to your Raspberry Pi using your (PC/Laptop, Android, and iPhone) wirelessly or wired. You'll see how to connect to RPi GUI (Graphical User Interface) via VNC server and to its CLI (Command Line Interface) via SSH.
Network Basics: This section explains the basic concepts of networks that you need to understand before you get into Wi-Fi hacking. It will elaborate on the differences between Managed & Monitor modes in Wi-Fi cards and explain what the Mac Address is and how to spoof it.
Pre-Connection Attacks: This section teaches you the attacks that you can carry out against any Wi-Fi access point without having to be associated with it. These attacks are very important to understand/learn because it's the key to the next Wi-Fi cracking section.
Cracking WEP Wi-Fi Key using Raspberry Pi: This section focuses on explaining what WEP encryption is and the different methods to crack WEP Wi-Fi keys. This section focuses on the practical side without neglecting the theory behind each attack.
Hacking Wi-Fi Access point by Cracking the Password: This is the first section of the Hacking WPA/WPA2 Key series, where it is going to focus on cracking WPA2 Wi-Fi key using a dictionary attack. It will show you how to implement the attack using your Raspberry Pi or your computer CPU. You'll also learn the quickest way to crack WPA/WPA2 by using your GPU.
Hacking any Wi-Fi access point using Raspberry Pi (Without Wordlist): This section shows you the last option or the last attack that you can use to steal WPA2 Wi-Fi key without using a wordlist. You'll learn how to perform an Evil Twin attack, in which you jam the target AP and set up a fake one similar to the target AP.
Setup Raspberry Pi 3 to Hack Windows, Linux, Mac OSX: This section covers implementing Raspberry Pi 3 as a server to listen for the incoming connections. It also explains how to create a stager or a payload for Windows, Linux, and OSX which will give us access to the target OS. Lastly, you'll learn how to hack over WAN.
Hacking Windows/Linux just by plugging Raspberry Pi Zero: This section will take you a step further by teaching you how to use Raspberry Pi Zero w to gain access to any Windows or Linux operating system just by plugging it into the targeted computer. It also teaches you how hackers can steal and crack locked Windows login credentials just by plugging RPi Zero w into the target computer.
Post Exploitation (Windows, Linux): After learning how to gain access to any Windows and Linux OS, this section, will continue with explaining the attacks that can be carried out on the target OS like (maintaining your access, escalating your privileges, extracting sensitive information).
Featured Courses
FAQ
Can I get a refund if I'm unhappy with my purchase?
Yes. All courses come with a 30-day money-back guarantee.
Do course purchases come with lifetime access?
Yes. You only pay once for our courses!
Can I migrate Udemy courses?
Unfortunately, we cannot migrate users from Udemy to the Academy. Udemy does not provide us with student enrollment information. The Udemy courses receive the quality of life updates and are still supported by our team. We apologize for any inconvenience.