Learn Cracking Wi-fi Passwords/Keys (WEP/WPA/WPA2)

seeders: 4
leechers: 5
Added on July 24, 2015 by hawaiizfynestin Other > Unsorted
Torrent verified.



Learn Cracking Wi-fi Passwords/Keys (WEP/WPA/WPA2) (Size: 218.57 MB)
 004 Wireless Modes - Managed Monitor Mode Explained.mp48.45 MB
 003 What is MAC Address How To Change It.mp48.01 MB
 007 Deauthentication Attack.mp49.09 MB
 001 Introduction.mp45.52 MB
 002 Networks Basics.mp45.7 MB
 008 Cracking Sections Introduction.mp42.93 MB
 006 Targeted Sniffing.mp415.44 MB
 005 Sniffing Basics - Using Airodump-ng.mp413.87 MB
 002 WEP Cracking - Basic Case.mp412 MB
 004 WEP Cracking - ARP Request Reply Attack.mp48.77 MB
 005 WEP Cracking - Chopchop Attack.mp416.67 MB
 006 WEP Cracking - Fragmentation Attack.mp416.1 MB
 001 Theory Behind Cracking WEP.mp49.74 MB
 003 WEP Cracking - Fake Authentication.mp49.88 MB
 006 WPA Cracking - Cracking Key Using A Wordlist Attack.mp47.57 MB
 008 WPA Cracking - Even Quicker Cracking Using GPU.mp417.45 MB
 005 WPA Cracking - Creating a Wordlist.mp48.79 MB
 007 WPA Cracking - Speeding the Cracking Process Using Rainbow Tables.mp49.94 MB
 003 WPA Cracking - Theory Behind Cracking WPAWPA2.mp45.14 MB
 001 WPA Cracking - Introduction.mp45.2 MB
 002 WPA Cracking - Exploiting WPS Feature.mp415.2 MB
 004 WPA Cracking - How To Capture The Handshake.mp47.08 MB


Description

DONT FORGET TO SEED!

UPDATE!!! i have purchased a seedbox and currently it is seeding. if you feel the need to donate to me for my seedbox and everything (because the seedbox costs money) feel free to message me. if not, enjoy!

The following is from the course description:

Notes:

In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks.

This course is focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack, ll the attacks explained in this course are launched against real devices in my lap

The Course is Divided into three main sections:

Networks Basics: in this section you will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn a number of attacks that you can launch without the need to know the password such as controlling all the connections around you (ie: deny/allow any device from connecting to any network).
WEP Cracking: Now that you have gathered information about all the networks around you, and found your target, you will learn how to crack the key that the target uses. In this section you will learn three methods to crack WEP encryption. First you will learn the weaknesses in WEP that allow us to crack it, then you will learn the theory behind each method and finally you will learn how to launch that attack against WEP networks and obtain their key.
WPA Cracking: in this section you will learn a number of methods to crack WPA/WPA2 networks, again you will learn the weakness in WPA and theory behind each method first, and then you will learn how to launch the attack against a real network.
All the attacks in this course are practical attacks that work against real wireless networks, all of the attacks are carried out against real networks in my lab. Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

NOTE: This course is totally a product of Igneus Technologies and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

What are the requirements?

Basic IT skills
Wi-Fi card (preferably one that supports injection)
Kali Linux (can be download for free from http://www.kali.org/downloads/)
What am I going to get from this course?

Over 22 lectures and 2 hours of content!
Have a good understanding of how networks operate
Understand how devices communicate with each other in a netowrk
Discover wireless networks within range
Gather information about wifi networks
Discover connected devices to each wifi network within range
Disconnect any device from any network within range
Learn the main weaknesses of WEP encryption and how it can be cracked
Launch interactive packet reply attack to crack WEP encryption
Launch chopchop reply attack to crack WEP encryption
Launch fragmentation attack to crack WEP encryption
Learn WPA/WPA2 weakness and the theory behind cracking it
Exploit WPS feature to crack WPA/WPA2 without a wordlist and without the need to any connected clients
Capture handshake and launch word list attack
Create your own wordlist
Launch a wordlist attack using the GPU
Launch a word list attack using a rainbow table
What is the target audience?

Anybody who is interested in learning about network penetration testing

Sharing Widget


Download torrent
218.57 MB
seeders:4
leechers:5
Learn Cracking Wi-fi Passwords/Keys (WEP/WPA/WPA2)