Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hacking WEP/WPA/WPA2 WiFi Networks Using Kali Linux 2.0
Preparation
Installing Kali Linux 2.0 as ISO file
Installing Kali Linux as a virtual machine (VirtualBox)
Installing Kali Linux as a virtual machine (VMware)
Setup Windows as a Virtual Machine
Connecting WiFi card to the Virtual Machine
Updating Kail Linux 2.0
Network Basics
Network Basic explain
What is the Mac address and how you can change it
Enabling monitor mode on WiFi card
Gather AP information Before Cracking
Gather AP information introduction
Capturing packets in our WiFi range
Capturing specific network packets
Disconnecting any device from any WiFi access point
Discover the hidden WiFi networks
Jamming any WiFi access point
Cracking WEP encryption
introduction
Cracking WEP encryption explain
Cracking WEP encryption methods
Cracking WEP encryption demo
Fake authentication with the target network
Cracking WEP using Korek Chopchop Attack
Cracking WEP using ARP Request Replay Attack
Crcaking WEP using Hirte Attack
Cracking WPA/WPA2 Encryptions
Cracking WPA/WPA2 encryption explain
Cracking WPA/WPA2 encryption methods
Cracking WPA/WPA2 using WPS feature
Capturing the Handshake
Creating a Wordlist
Cracking WPA/WPA2 using dictionary attack
Cracking WPA/WPA2 using bruteforce attack
Cracking WPA/WPA2 using Rainbow Table
Cracking WPA/WPA2 using Hashcat (GPU)
Cracking WPA/WPA2 using Evil Twin attack
Getting the username and the password of the target router
Man in the Middle Attacks
Introduction
Gathering information about the connected clients
Gather detailed information about the clients
Man in the middle attack explain
MITM attack using (arpspoof)
Capturing login credentials
Bypassing SSL Certificate
Redirect any client from to any website
Stealing the Cookies
Capture a screenshot from the target browser
Injecting a keylogger into the webpage
Capturing images from the network traffic
Injecting html file and flip the images in the target browser
Injecting JavaScript URL and Hooking the client’s with BeEF
Having fun with BeEF
Stealing the target accounts with BeEF
Fully accessing the connected devices
Creating an encrypted Backdoor
Testing the Backdoor in the target device
Creating a Fake browser Update and Hack any client
Interacting with the Target Computer (Part 1)
Interacting with the Target Computer (Part 2)
Protect your WiFi AP and yourself against all the previous attacks
Protect your WiFi AP against all of the previous attacks
Detect ARP Poisoning attack using (XARP)
Detect ARP Poisoning attack (Wireshark)
Prevent your ARP table from poisoning
Detect and Kill any Meterpreter Session
Extras
Disconnecting paired Bluetooth devices
Connecting WiFi card to the Virtual Machine
Complete and Continue