Ethical Hacking: Wireless Networks

Ethical Hacking: Wireless Networks

English | MKV | AVC 1280×720 | AAC 44KHz 2ch | 1h 40m | 292 MB

Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.

Table of Contents

1 learn how to protect your wireless network
2 what you should know before watching this course
3 course disclaimer
4 understanding wireless networks
5 selecting an antenna for wireless network testing
6 configuring security in wireless networks
7 understanding the wi-fi protected setup (wps)
8 extracting wep passwords using wifite
9 extracting network passwords through wps
10 using wifite and aircrack-ng to test wpa passwords
11 using pixiedust to recover keys
12 a first look at wpa3
13 understanding dragonblood
14 harvesting connections with an evil twin
15 set up the wifi pineapple
16 harvest credentials with the wifi pineapple
17 capturing wpa handshakes
18 understanding bluetooth
19 scanning for bluetooth devices
20 legacy attacks using bluesnarfer
21 using fernwi-fi cracker
22 discovering networks with inssider
23 capturing wireless packets with acrylic analyzer
24 heat mapping with ekehau
25 wi-fi sniffing using wireshark
26 scanning with vistumbler
27 using commview to scan wi-fi networks
28 testing the internet of things
29 summary

Homepage