THE PERFECT $10 SALE IS FINALLY HERE! Avail upto 90% OFFView Offer
  • Sign In
  • Registration

Learn WiFi Hacking & Pentesting

How to hack WiFi networks and protect yourself and your network against them

Price : $10.00 $199.00



Money Back





This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.+The course is structured in a way that will take you through the basics of Linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level.

The following topics will be covered during the course:

  • How Wireless Networks Work.
  • Important Settings to Change on Your Router.
  • How to Install Kali Linux in VMware Player.
  • Useful Linux Commands with Examples.
  • Perform a Denial of Service Attack and Find Hidden Wireless Networks.
  • How to Hack WiFi Networks (WEP, WPA, WPA2).
  • Use various tools like: Aircrack-ng, Wifite, Crunch, Cowpatty, Pyrit, Reaver.
  • How to Create an Evil Twin Access Point.
  • After completing this course you will be confident with breaking all types of WiFi encryption methods.


    Rating 4.5 (50 Reviews)

  • Prepration
    • Intro about Kali Linux & Installation Options
    • Installing Kali Linux Using an ISO Image
    • How to Connect WiFi Card to a Virtual Machine & Final Setup
  • Introduction & Networks Basics
    • Course Outline
    • Network Basics
    • What is MAC Address & How To Change It
    • Wireless Modes - Managed & Monitor Mode
  • Pre-Connection Attacks
    • Sniffing Basics - Airodump-ng Basics
    • Targeted Sniffing
    • Deauthentication Attack
    • Rule Based Deauthentication Attack - Installing Airdrop-ng
    • Rule Based Deauthentication Attack - Creating Rules
    • Rule Based Deauthentication Attack - Launching The Attack
    • Creating A Fake Access Point - Theory
    • Creating A Fake Access Point - Practical
  • Gaining Access
    • Gaining Access Intro
    • Theory Behind Cracking WEP Encryption
    • WEP Cracking - Basic Case
    • WEP Cracking - Fake Authentication Attack
    • WEP Cracking - Interactive Packet Replay Attack
    • WEP Cracking - ChopChop Attack
    • WEP Cracking - Fragmentation Attack
    • WPA Cracking - Introduction
    • WPA Cracking - Exploiting The WPS Feature
    • WPA Cracking - Theory Behind Cracking WPA/WPA2
    • WPA Cracking - Capturing The Handshake
    • WPA Cracking - Creating a Wordlist
    • WPA Cracking - Cracking The Key Using a Wordlist
    • WPA Cracking - Cracking The Key Using A Rainbow Table
    • WPA Cracking - Cracking The Key Using GPU
  • Post Connection Attacks
    • Post Connection Attacks Intro
    • Information Gathering - Discovering Connected Devices Using Netdiscover
    • Information Gathering - Gathering More Info Using Autoscan
    • Even More Detailed Information Gathering Using Zenmap
    • MITM - ARP Poisoning Theory
    • MITM - ARP Poisoning Using arpspoof
    • MITM - Ettercap Basics
    • MITM - Bypassing HTTPS/SSL Using SSLstrip
    • MITM - Session Hijacking
    • MITM - DNS Spoofing Attack
    • MITM - Bypassing "Remember me" Feature in HTTPS Websites
    • MITM - Ettercap Plugins
    • MITM - Ettercap Filters
    • MITM - Using Ettercap GTK
    • MITM - Analysing Captured Packets Using Xplico
    • MITM - Wireshark Basics
    • Detecting ARP Poisoning Attacks
    • Detecting Suspicious Behaviour on The Network
    • Scenario - Creating A Fake Update & Hacking Any Device In The Network
    • Wi-fEye - Launching The Above Attacks Automatically