Сообщение

[Udemy] Learn Cracking Wi-fi Passwords/Keys (WEP/WPA/WPA2) [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 14:19

Learn Cracking Wi-fi Passwords/Keys (WEP/WPA/WPA2)

Год выпуска: 2015
Производитель: Udemy
Сайт производителя: www.udemy.com/learn-cracking-wi-fi-pass ... epwpawpa2/
Автор: Zaid Al-Quraishi
Продолжительность: 2+ hours
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: В ходе этого курса вы сможете запустить в качестве новичка с нет предыдущих знаний о проникновение тестирования. Курс построен таким образом, что это будет вас по основам работы в сети и о том, как клиенты общаются друг с другом, а затем мы начнем разговор о том, как мы можем использовать этот способ связи для выполнения ряда мощных атак.Данный курс посвящен практической стороны беспроводных проникновение тестирование, не забывая при этом теории за каждое нападение, ll нападений в этом курсе, против реального устройства в мой круг
1 Introduction 03:25
2 Networks Basics 03:09
3 What is MAC Address & How To Change It 04:44
4 Wireless Modes - Managed & Monitor Mode Explained
5 Sniffing Basics - Using Airodump-ng
6 Targeted Sniffing
7 Deauthentication Attack
8 Cracking Sections Introduction
9 Theory Behind Cracking WEP
10 WEP Cracking - Basic Case
11 WEP Cracking - Fake Authentication
12 WEP Cracking - ARP Request Reply Attack
13 WEP Cracking - Chopchop Attack
14 WEP Cracking - Fragmentation Attack
15 WPA Cracking - Introduction
16 WPA Cracking - Exploiting WPS Feature
17 WPA Cracking - Theory Behind Cracking WPA/WPA2
18 WPA Cracking - How To Capture The Handshake
19 WPA Cracking - Creating a Wordlist
20 WPA Cracking - Cracking Key Using A Wordlist Attackcture to crack the WPA keyusing aircrack-ng.
21 WPA Cracking - Speeding the Cracking Process Using Rainbow Tables
22 WPA Cracking - Even Quicker Cracking Using GPU
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 30.000 fps, ~ 1359 Kbps
Аудио: AAC, 48.0 KHz, ~ 96.0 Kbps, 2 channels
In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks.

This course is focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack, ll the attacks explained in this course are launched against real devices in my lap

The Course is Divided into three main sections:

Networks Basics: in this section you will learn about how networks work, how devices communicate with each other and how the information is transferred in a wireless networks. You will also learn about basic terminology, what is a channel ? MAC address ? what is managed mode ? What is monitor mode and how to enable it ? what is sniffing and what is it limited to ? so in this section we still don't know much about penetration testing , all we have is a computer and a wireless card connected to it, you will learn how to start gathering information using your wi-fi card (packet sniffing) and you will learn a number of attacks that you can launch without the need to know the password such as controlling all the connections around you (ie: deny/allow any device from connecting to any network).
WEP Cracking: Now that you have gathered information about all the networks around you, and found your target, you will learn how to crack the key that the target uses. In this section you will learn three methods to crack WEP encryption. First you will learn the weaknesses in WEP that allow us to crack it, then you will learn the theory behind each method and finally you will learn how to launch that attack against WEP networks and obtain their key.
WPA Cracking: in this section you will learn a number of methods to crack WPA/WPA2 networks, again you will learn the weakness in WPA and theory behind each method first, and then you will learn how to launch the attack against a real network.
All the attacks in this course are practical attacks that work against real wireless networks, all of the attacks are carried out against real networks in my lab. Each attack is explained in a simple way first so that you understand how it actually works, so first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.

NOTE: This course is totally a product of Igneus Technologies and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 14:19
Размер: 218.57 МБ
Размер: 229 187 560 байт
Сидеров: 1
Личеров: 0
Скачали: 1
Здоровье: 100%
Раздающих: 100%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: 1 год 1 месяц 30 дней 12 часов 18 минут 18 секунд назад
Последний личер: 1 год 1 месяц 30 дней 12 часов 45 минут 34 секунды назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 19.11 КБ / Просмотров 2 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность