This course aims to teach you in depth WiFi Hacking and Security. After completing this course you will be confident with breaking all types of WiFi encryption methods.
In this course you will start as beginner without or with low knowledge about WiFi security and Kali Linux.
This course is separated in 7 main sections:
- Introduction - In this section you will see what you will be introduced to course outline and requirements for this course.
- Working Environment setup - Here you will set your working environment and tools required for successful
- Kali Linux Introduction - In this section you will be introduced to the main system you will be using
- Network Basics - In this section students will learn how does the network work
- Essentials Tools - We will learn essentials tools required for penetration
- Passive Information Gathering - In this section you will learn how to passively gather information
- Active Information Gathering - Same as previous section but here you will learn active gathering of information
- Vulnerability Scanning - Here you will learn how to found vulnerabilities of the target
- Buffer Overflows - This section will teach you how to overrun buffer memory
- Windows Buffer Overflow example - Here you will see example of buffer overrun in Windows system
- Password Attacks - This section will teach you how to require passwords actively with direct attacks on password
- Client Side Web Vulnerabilities - Here you will learn what are vulnerabilities users on the web
- Server Side Web Vulnerabilities - This section will teach you vulnerabilities of host machines / servers
- WiFi Getting Access - Here you will learn how to attack WiFi network in order to connect to it
- WiFi Preconnection Attacks - This section will teach you how to require WiFi login details without active attack
- Port Fun - This section shows you how to scan entrance to the host machine trough ports
- Post Exploitation - This phase actually deals with collecting sensitive information, documenting it, and having an idea of the configuration settings, network interfaces, and other communication channels
- Extra - All the good stuff here
- Simulated Penetration Testing - Here you will need to test and exercise your defenses to ensure they're up to the task. The best way to do this is by simulating real-world attacks.