Hacking Wireless Networks. Theory and practice.

38% of secured Wi-Fi networks are vulnerable to the attack which can be carried out by a 12-year-old in 4 minutes! HOW?

Hacking Wireless Networks. Theory and practice.

Price$97.00

SchoolUdemy
ScheduleOn Demand
LocationOnline
Duration5 hours
Credits0
Enroll
Rating
Reviews10
Popularity1942 Registered
In CertificateNo
Difficultyall level
EffortN/A
Course DetailsCourse FAQ

Hacking Wireless Networks. Theory and practice.

Categories:
Software & IT

Welcome to Hacking School!

Ethical Wireless Network Hacking Course:
Hacking Wireless Networks. Theory and practice.


Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.


This course covers all the important techniques related with WIRELESS NETWORK (or WiFi) HACKING used by hackers, system administrators and pentesters.


Wireless networks are all around us. You want it or not, you ARE part of this system. As new wireless encryption-standards are being developed, new attack techniques are being discovered and presented at the same time. It’s a real arms race.


Either you want to make your home WiFi network more secure, you want to recover a forgotten password, or you want to break into your wireless network to prove it is secure - regardless of the WiFi encryption-type used (WEP, WPA, WPA2), you will find the answer in this course.


What you can expect from this course:

  • You will get access to over 60 interesting lectures on Wireless Network Hacking
  • You can download the course Handbook in PDF (over 180 pages)
  • You can download the Training Operating System v2.0 CE (CUDA Extension) which is equipped with all the tools described in this course
  • It is a step by step training on WiFi ethical hacking
  • It covers over 25 different Wireless Network Hacking techniques and experiments
  • This course can be treated as a valuable source of knowledge by white- and blackhat hackers, pentesters and network analysts
  • You can get access to all the source codes and tools described in the course – it’s already prepared for you in the Training Operating System environment
  • You can boot the Training Operating System from CD/DVD or start it inside a virtual machine (using VirtualBox on Windows and VMware Fusion on MAC OSX)


What you need to know before you begin:

  • This ethical hacking course is intended to help you regardless of your current knowledge and skills. All you need is a basic computer knowledge and our Training Operating System v2.0 (you will also get access to it!).
  • We will show you how to prepare your training environment. In this environment you can experiment freely, without doing harm to anybody.
  • You will find all the source codes and examples inside your Training OS to avoid unnecessary code retyping.
  • Most of the modules (lessons) contain the attack related part, as well as a guidance to protect your own wireless network.
  • What you will find inside can also be used by beginners - thanks to live Video Training attached to the course.


The complete list of all the video training sessions included in this course:

  • The configuration of wireless network card modes
  • Changing the MAC address of the wireless network card
  • Finding a hidden access point with disabled ESSID broadcast
  • The use of deauthentication attack for jamming network traffic
  • The overview and demonstration of the chop-chop attack
  • Generating packets without knowing the network key
  • Interactive packet replay and ARP request replay
  • The demonstration of the PTW and KoreK attacks
  • Creating a fake access point – the Caffe Latte attack
  • The dictionary attack on WPA/WPA2
  • The dictionary attack on WPA/WPA2 – using hash tables
  • CUDA – the initial preparation of the environment
  • The installation of CUDA-SDK and CUDA-Toolkit
  • The compilation and installation of the tools with CUDA support
  • The optimization of the parameters of an nVidia video card
  • CUDA – preparation for the attack
  • CUDA – the attack on WPA/WPA2
  • Generating your own dictionary
  • Applications for cracking MD4 and MD5 hashes with the use of CUDA technology


Please be advised that all the techniques presented in this course can only be used ethically and in your own testing / researching environment. Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.


Good luck and see you on the other side,
Andrew Harper || Hacking School Team

Course Details

Download your Training Operating System v2.0 CE
online
chapter
On Demand
Download the TOS v2.0 CE (CUDA Extension) ISO image
online
lecture
On Demand
Download the whole course Handbook
online
chapter
On Demand
Download the course Handbook in PDF
online
lecture
<p style=" text-align:center;"> <strong style=""><span>You can find the whole course Handbook in supplementary materials of this lecture.</span></strong> </p> <p style=" text-align:center;"> <strong style="">(click on the download icon in the side menu)</strong> </p>
On Demand
Course overview
online
chapter
On Demand
Table of contents
online
lecture
On Demand
Legal information
online
lecture
On Demand
Introduction to wireless networks
online
chapter
On Demand
Introduction
online
lecture
On Demand
Wireless transmission standards
online
lecture
On Demand
802.11 wireless network types
online
lecture
On Demand
Encryption and authentication standards
online
lecture
On Demand
Wireless network cards in Linux - overview
online
lecture
On Demand
Wireless network interface cards in Linux
online
lecture
On Demand
Wireless security (half) measures: An overview
online
chapter
On Demand
MAC address filtering
online
lecture
On Demand
Changing the MAC address of the wireless network card
online
lecture
On Demand
Disabling ESSID broadcast
online
lecture
On Demand
Finding a hidden access point with disabled ESSID broadcast
online
lecture
On Demand
Limiting wireless coverage
online
lecture
On Demand
Wireless network attacks independent of used encryption
online
chapter
On Demand
Introduction
online
lecture
On Demand
DoS: RF jamming
online
lecture
On Demand
DoS: CSMA/CA jamming
online
lecture
On Demand
The use of deauthentication attack for jamming network traffic
online
lecture
On Demand
DoS: Deauthentication attack
online
lecture
On Demand
Wireless MITM
online
lecture
On Demand
WEP attacks
online
chapter
On Demand
Section outline
online
lecture
On Demand
WEP encryption
online
lecture
On Demand
Chopchop
online
lecture
On Demand
The overview and demonstration of the chop-chop attack
online
lecture
On Demand
Keystream reuse
online
lecture
On Demand
Generating packets without knowing the network key
online
lecture
On Demand
Interactive packet replay and ARP request replay
online
lecture
On Demand
The demonstration of the PTW and KoreK attacks
online
lecture
<p style=""> <strong style=""><span>You can find some supplementary materials in download section.</span></strong> </p>
On Demand
Caffe Latte Attack
online
lecture
On Demand
Creating a fake access point – the Caffe Latte attack
online
lecture
On Demand
WPA attacks
online
chapter
On Demand
Introduction
online
lecture
On Demand
WPA
online
lecture
On Demand
The dictionary attack on WPA
online
lecture
On Demand
WPA2
online
lecture
On Demand
Rainbow tables
online
lecture
On Demand
The dictionary attack on WPA – using hash tables
online
lecture
On Demand
Cowpatty attack
online
lecture
On Demand
DoS: Taking advantage of the MIC failure holdoff time
online
lecture
On Demand
CUDA-powered attacks
online
chapter
On Demand
What is CUDA?
online
lecture
On Demand
CUDA – the initial preparation of the environment
online
lecture
<p style=""> <strong style="">You can find some supplementary materials in download section.</strong> </p>
On Demand
The installation of CUDA-SDK and CUDA-Toolkit
online
lecture
On Demand
The compilation and installation of the tools with CUDA support
online
lecture
On Demand
The optimization of the parameters of an nVidia video card
online
lecture
On Demand
CUDA – preparation for the attack
online
lecture
On Demand
CUDA – the attack on WPA
online
lecture
<p style=""> <strong style=""><span>You can find some supplementary materials in download section.</span></strong> </p>
On Demand
Generating your own dictionary
online
lecture
On Demand
Applications for cracking MD4 and MD5 hashes with the use of CUDA technology
online
lecture
<p style=""> <strong style=""><span>You can find some supplementary materials in download section.</span></strong> </p>
On Demand
Wardriving experiment
online
lecture
On Demand
Advanced attacks against WPA
online
chapter
On Demand
WKA TKIP attack
online
lecture
On Demand
WPA TKIP broken
online
lecture
On Demand
Beck-Tews attack enhanced
online
lecture
On Demand
Michael Reset attack
online
lecture
On Demand
Summary
online
lecture
On Demand
Summary
online
chapter
On Demand
Summary
online
lecture
On Demand
References
online
chapter
On Demand
References
online
lecture
On Demand
Free additions
online
chapter
On Demand
IT SEC Beginner: Certified Hacking Training: Monitoring - What you will learn
online
lecture
On Demand
IT SEC Beginner: Certified Hacking Training: Monitoring Transmitted Data
online
lecture
On Demand
IT SEC Beginner: Certified Hacking Training: WiFi Security - What you will learn
online
lecture
On Demand
IT SEC Beginner: Certified Hacking Training: WiFi Security - Overview and sol...
online
lecture
On Demand
IT SEC Beginner: Certified Hacking Training: WiFi Security - Threats
online
lecture
On Demand
Website Hacking in Practice Course: Module 13. SQL injection - Video Training
online
lecture
On Demand

FAQ

Q. How long do I have access to the course materials?

A. You can view and review the lecture materials indefinitely, like an on-demand channel.

Q. What is the refund policy on the course?

A. We like to keep our users happy, so we have a 30-day no questions asked refund policy. Send an email to [email protected] for refund requests.

Q. Can I take my courses with me wherever I go?

A. Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!


Reviews of Hacking Wireless Networks. Theory and practice.

  1. Posted by Jake Pilgrim| February 21, 2016

    More video lectures

  2. Go aways save your money and time
    Posted by Salvatore Innaimi| June 30, 2015

    a real unprofessional people. They give the download of a CD and the speed is 47kb OMG. The PDF are broken too ....

  3. interesting and very well done
    Posted by Jelle Lerutte| March 26, 2015

    The course learned me what i wanted to know and helped me make my network more secure. Thanks for bringing this one.

  4. A pain from the begining
    Posted by Fernando Topaz| March 16, 2015

    It starts asking you to download some suspicious software then it makes you go trough a serial of pdf documents and instructions that some people just doesn't have the time to read... that's why this is UDEMY. Everything should be on video step by step and not asking to download personal programs in exchange for your email address. Just trying to make a point here to keep a level on the courses here. No way... I will not download that program in this or any other life. Such a smart way to start. One star is too much at this moment.

  5. Summary
    Posted by Manuel Ramón Gutiérrez Covarrubias| February 23, 2015

    At the begin, basically theorical. Next, good road. Bad final, lesson 62, its video doesn´t play. It seems break lesson for months.

  6. Has strengths and weaknesses
    Posted by Ian Hill| August 19, 2014

    As a prospective student to this material one should know first and foremost that you are going to be doing a lot of reading as this course is almost entirely a dissected pdf representing slides. Conveniently, the pdf is available for download. The videos represented (aside from those at the end of the course material which are not actually part of this courese) are largely a video overlaid with narration of written slides as transcript. There is quite a bit of discussion on theory with good descriptions of the encryption process and the theory behind several given attacks, but I found that there were many cases were the "how-to" of attacks and the remedies for vulnerabilities were really only mentioned in passing. It is noteworthy that the original document was seemingly not composed in English, so ,while understandable, there are some issues and the presentation is often very dry and technical. I also have to note that at this point, despite several discussions there has been no feedback from the course presenter. It was good for me personally. If you are interested in theory, how attacks actually work, and understanding more about wireless encryption this is a great place to look. If you only want to add a variety of attacks to your tooklit this isn't it.

  7. Good stuff!
    Posted by Richard Montalvo| July 28, 2014

    It gives you the meat and potatoes of wireless networks and how to dig your way into them, as well as how someone that wants to watch the world burn could easily take down access to a wireless network without even knowing the security key! Although, I will say this: It's description of encryption, to say the least, is quite confusing. My head throbbed in a bit of pain as I sifted through the various abbreviations and keys. Additionally, if you do not have a computer with an nVidia graphics card that supports CUDA, you won't be able to follow along completely well with some of the lectures, as they require CUDA support. And finally, some of the lectures in here only describe the theory and do not give any sort of practice, but this is because the appropriate tools probably weren't out at the time of this course's release (and still might not be out, but I haven't checked yet.) Regardless, a great course.

  8. 4.5/5
    Posted by Maggie Blue| June 29, 2014

    I haven't finished the training yet but it's been really informative so far. Thank you!

  9. Thanks
    Posted by Andy Cohen| June 28, 2014

    This is what I've been looking for. Good high quality content and great (native US) trainer. Quite a lot of reading in this course though (there's a PDF with the book). I can totally recommend it!

Course provided by: Udemy