Unleash Your WiFi Hacking Skills: Master the Complete Course from Beginner to Advanced Level

Master the Art of Wi-Fi Security: Explore the Depths of Wireless Networks in this comprehensive course. Whether you're a beginner or have prior knowledge, dive into the world of Wi-Fi threats, vulnerabilities, and countermeasures. Learn to break through various encryption types (WEP/WPA) using powerful tools like Aircrack-ng and Wifite. Discover advanced techniques such as evil twin attacks and creating deceptive captive portals to enhance your skills. Join us now and become a proficient Wi-Fi security expert.

Beginner 0(0 Ratings) 0 Students enrolled English
Created by Magson Fernandes
Last updated Sun, 17-Mar-2024
+ View more
Course overview

This class is all about Wi-Fi and how to keep wireless networks safe, so you’ll learn a lot about that. You’ll learn about the different threats, weaknesses, and ways to get in and get out of them.

It doesn’t matter if you already know how to do basic things, like how to install Kali Linux.

To learn how to break any kind of Wi-Fi encryption (WEP/WPA), you’ll use tools like Aircrack-ng and Wifite. You’ll also learn how to use tools like Aircrack-ng and Wifite to do it.

This class is for everyone. In this class, I’ll teach you how to do advanced evil twin attacks on targets using a wide range of tools, and how to make a captive portal that steals login credentials.

In this class, we’ll cover the following:

  • Wireless networks and how they work
  • Important settings on your router that you should change, like the IP address.
  • It shows you how to install Kali Linux in VMware Player.
  • In this video, we show you how to use some Linux commands with examples.
  • A Denial of Service Attack and looking for hidden wireless networks are two things you can do.
  • It shows you how to get into wireless networks (WEP, WPA, WPA2).
  • Do this with different tools like Aircrack-ng, Wifite, Crunch, Cowpatty, Pyrit, Reaver, and more.
  • Set up an Access Point with a Locked Portal, then.
  • When you make a fake captive portal, you can use it to steal login information.
  • Making changes to the Captive Portal Page.
  • You can learn how to Sniff and Add Packets to a Wireless Network.
  • Use Filters in Wireshark to Look at Packets.
  • Armageddon can help you do an Evil Twin Attack.
  • Using a Captive Portal to get into someone’s social media accounts.
  • How to use DNS Spoofing and BeEF with WiFi Pumpkin. This video shows you how to do it.
  • Stolen credentials from a WPA Enterprise Network
  • Detect and Protect Your Computer from Attacks by Evil Twins.

By the end of this course, you will know how to break all kinds of Wi-Fi encryption methods and how to make your own evil twin attack for different situations.

What will i learn?

  • A Denial of Service Attack and looking for hidden wireless networks are two things you can do.
  • Do this with different tools like Aircrack-ng, Wifite, Crunch, Cowpatty, Pyrit, Reaver, and more.
  • Hack into Wireless Networks (WEP, WPA, WPA2).
  • Then, make a fake Wi-Fi network.
  • When you make a fake captive portal, you can use it to steal login information.
  • You can learn how to Sniff and Add Packets to a Wireless Network.
  • Armageddon can help you do an Evil Twin Attack.
  • Using a Captive Portal to get into someone’s social media accounts.
  • Stolen credentials from a WPA Enterprise Network
  • Detect and Protect Your Computer from Attacks by Evil Twins.
Requirements
  • Basic understanding of computer networks
  • Knowledge of operating systems
  • Familiarity with wireless networks
  • Familiarity with Kali Linux
  • Curiosity and willingness to learn
Curriculum for this course
44 Lessons 01:46:20 Hours
1. Introduction
5 Lessons 00:16:29 Hours
  • 1. Course Introduction
    00:01:49
  • 2. Introduction to Wireless Networks
    00:03:51
  • 3. Important Settings to Change on Your Router
    00:03:13
  • 4. How to Install Kali Linux in VMware Player
    00:02:43
  • 5. Useful Linux Commands
    00:04:53
2. Pre-Connection Attacks
4 Lessons 00:10:38 Hours
  • 6. Packet injection and monitor mode
    00:02:22
  • 7. How to find Hidden Wireless Networks
    00:02:03
  • 8. How to Spoof your Mac Address
    00:02:26
  • 9. How to use Wireshark
    00:03:47
3. WiFi Attacks
9 Lessons 00:23:20 Hours
  • 10. How to perform a Denial of Service Attack
    00:03:06
  • 11. How to hack WiFi Networks with WEP encryption
    00:03:46
  • 12. How to hack WiFi Networks with WPAWPA2 encryption
    00:02:53
  • 13. How to Create your own Wordlist using Crunch
    00:02:04
  • 14. Speeding up WPA2 Cracking
    00:02:39
  • 15. How to hack WiFi Networks using Pyrit
    00:02:24
  • 16. How to hack WiFi Networks with Reaver
    00:02:27
  • 17. How to Create an Evil Twin Access Point
    00:04:01
  • How To Prevent Evil Twin Attacks
    .
4. Evil Twin Attacks
16 Lessons 00:33:38 Hours
  • 20.Introduction To Evil Twin Attacks
    00:01:48
  • 21. Intro to Evil Twin and Captive Portals
    00:02:39
  • 23. Choosing the Wireless Adapter
    00:02:25
  • 23.1Choosing-the-WiFi-Card
    .
  • 24. How to Sniff and Inject Packets into a Wireless Network
    00:02:54
  • 25. How to Set up an Access Point
    00:03:37
  • 25.1 Hostapd and dnsmasq config files
    .
  • 26. Setting up a Captive Portal
    00:03:34
  • 26.1 Apache Rewrite
    .
  • 26.2 Basic Portal
    .
  • 27. How to Sniff Login Credentials from the Captive Portal
    00:02:05
  • 28. Capture the Login Information using a PHP Script
    00:02:17
  • 29. Setting up an Access Point with a Fake Captive Portal
    00:04:10
  • 30. Stealing Credentials with the Social Engineering Toolkit
    00:02:28
  • 31. How to use BeEF with the Captive Portal
    00:03:00
  • 32. How to Set up an Access Point with Internet Access
    00:02:41
5. WiFi Hacking Tools
6 Lessons 00:16:37 Hours
  • 33. How to use Wireshark Filters to Inspect Packets
    00:01:52
  • 34. Evil Twin Attack with Airgeddon
    00:03:30
  • 35. Customizing the Captive Portal Page
    00:01:44
  • 36. Stealing Login Credentials from a WPA Enterprise Network
    00:02:50
  • 37. Stealing Social Media Accounts using a Captive Portal
    00:03:37
  • 38. How to use Dns Spoofing and BeEF using WiFi Pumpkin
    00:03:04
6. Security
4 Lessons 00:05:38 Hours
  • 39. Detect WiFi Attacks using Wireshark
    00:01:48
  • 40. How to Detect Evil Twin Attacks using EvilAP Defender
    00:01:55
  • 40.1 Tips to Protect from Evil Twin Attacks
    .
  • 41. Protect your Home Network using Guest WiFi
    00:01:55
+ View more
Other related courses
About instructor

Magson Fernandes

Educator in the Digital Age

1 Reviews | 4 Students | 27 My Courses
Teaching Learning Experimenting IT Web Designing App Designing Graphic Designing Etc
Student feedback
0
0 Reviews
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Reviews

₹14620
Includes:
//send gift when already purchased by user