Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Wireless Penetration Testing with Kali Linux & Raspberry Pi
Introduction
Course Introduction (1:39)
Hardware Requirements (6:57)
Downloading and installing Kali Linux on Raspberry Pi (8:56)
Downloading and installing Kali Linux in VirtualBox on Windows (8:42)
Downloading and installing Kali Linux in VirtualBox on Mac OS X (6:20)
Connecting to Kali Linux for the first time - VirtualBox
Connecting to Kali Linux for the first time - Raspberry Pi (8:45)
Updating Kali Linux (3:37)
Setting up your wireless adapter (19:51)
Conclusions (1:24)
Bypassing Wireless LAN Authentication
Bypassing Hidden SSIDs (7:05)
Bypassing MAC Address filtering (13:19)
Bypassing Shared Key Authentication (6:55)
Bypassing Open System Authentication (2:35)
Cracking WEP (8:44)
Cracking WEP with fern-wifi-cracker (8:00)
Cracking WPA & WPA2 (11:37)
Cracking WPA2 with Wifite and Cowpatty (8:42)
Connecting to a WPA/WPA2 wireless network (4:04)
MITM - Man in the middle attack (15:31)
MITM with Ettercap (9:17)
Conclusions
Cracking WPA & WPA2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock