Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
  • Table Of Contents Toc
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

By : Saad Sarraj
1 (1)
close
close
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

1 (1)
By: Saad Sarraj

Overview of this book

In this course, you will learn how to set up your Kali Linux lab environment properly. In addition to that, you will learn how devices communicate with each other. Lastly, you will learn the best out of this course, which is Man in the Middle attacks. This course is divided into six sections: - Preparation: In this section, you will learn how to download and set up the latest version of Kali Linux as a virtual machine or as your main OS. This helps you create your own safe hacking lab environment. - Network basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing. - Gather AP information before cracking: In this section, you will learn how you can enumerate the target access point such as ESSID-BSSID-Channel-Encryption type, and so on. You will learn how you can disconnect, kick any client from your target network, or even jam the wireless access point completely without having its password. - Cracking WEP/WPA/WPA2 encryption: After gathering information about the target access point, it’s time to learn how to crack WEP/WPA/WPA2 encryption keys and the theory behind each attack. - MITM attack: In this section, you will learn how to perform man-in-the-middle attacks and what post-modules can be carried out on the target OS. Modules such as playing music on the target OS, stealing credentials, and many more. You will even learn how to gain full access to the connected devices. - Protecting yourself against these attacks: After learning MITM attacks, it’s time to learn how to protect your OS against all the previously mentioned attacks. By the end of the course, you will be able to perform MITM attack on the target network and fully control all the connected computers. You will be able to protect yourself from the MITM attack.
Table of Contents (11 chapters)
close
close
1
Introduction
chevron up
You're currently viewing a free sample. Access the full title and Packt library for free now with a free trial.
Chapter: 1
Introduction
Icon This video is locked
Icon
Icon
0:00
2.0x
1.5x
1.25x
1.0x
0.5x
caption settings
caption off
English
Icon Icon
ShowHide Transcripts Icon
CONTINUE WATCHING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon