Packt
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

Give your career the gift of Coursera Plus with $160 off, billed annually. Save today.

Packt

Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

7 hours to complete
3 weeks at 2 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

7 hours to complete
3 weeks at 2 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Learn to set up your Kali Linux environment

  • Detect ARP Poisoning (MITM) attack to protect yourself against it

  • Carry out several attacks without having the key

  • Gain access to any client account in the Wi-Fi network

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

September 2024

Assessments

5 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 11 modules in this course

In this module, we will welcome you to the course, providing an overview of what to expect. We'll introduce the key topics and explain how they will be relevant to your learning journey and professional development.

What's included

1 video

In this module, we will cover the essential steps to prepare your system for the course. You'll learn how to set up Kali Linux as both a main operating system and within virtual machines using VirtualBox and VMware. We will also guide you through network configurations, performance enhancements, snapshot management, and updating procedures to ensure your environment is fully equipped for advanced tasks.

What's included

9 videos

In this module, we will delve into the basics of networking. You will gain an understanding of essential network concepts, including the role and manipulation of MAC addresses. Additionally, we will guide you through the installation of drivers for the ALFA AC1200 adapter and demonstrate how to enable monitor mode on your Wi-Fi adapter, equipping you to capture packets within your Wi-Fi range.

What's included

4 videos1 assignment

In this module, we will focus on gathering crucial information about access points before attempting to crack their security. You will learn how to scan for available Wi-Fi networks, capture packets, and analyze network traffic across different frequency bands. Additionally, we'll cover methods to disconnect devices, detect hidden networks, and jam access points, providing a comprehensive toolkit for pre-connection attacks.

What's included

7 videos

In this module, we will dive into the world of WEP encryption and its inherent weaknesses. You will explore the theory behind WEP encryption and learn various methods to crack it. Through detailed demonstrations, we will guide you on how to perform fake authentication, inject packets, and use specific attacks like Korek Chopchop, ARP Request Replay, and Hirte to efficiently crack WEP encryption keys. This comprehensive approach will equip you with practical skills for real-world applications.

What's included

8 videos

In this module, we will explore the intricacies of WPA and WPA2 encryption and various techniques to crack them. Starting with the theoretical foundation, we will cover practical methods such as using the WPS feature, capturing handshakes, and creating wordlists. You will learn to apply dictionary, brute-force, and Rainbow Table attacks, as well as leverage GPU power with hashcat. Additionally, we will demonstrate the powerful Evil Twin attack and teach you how to exploit routers to retrieve usernames and passwords. This comprehensive approach ensures you have the knowledge and tools to effectively crack WPA/WPA2 encryptions.

What's included

11 videos1 assignment

In this module, we will delve into the complexities of WPA-Enterprise Wi-Fi networks. You will gain a solid understanding of their structure and functionality before moving on to the practical aspects. We'll guide you through installing the required tools, creating a fake WPA-Enterprise network to deceive targets, and finally, cracking the captured hash with Hashcat. This module equips you with the skills needed to effectively target and compromise WPA-Enterprise networks.

What's included

4 videos

In this module, we will delve into the intricacies of Man-in-the-middle (MITM) attacks. You will learn the theory behind these attacks and how to gather detailed information about connected clients. We will guide you through performing ARP spoofing, capturing login credentials, bypassing SSL certificates, and redirecting clients to malicious sites. Additionally, you will learn to steal cookies, capture browser screenshots, inject keyloggers, HTML, and JavaScript, hook clients with Be EF, and steal social network accounts. Finally, we'll explore some entertaining commands to run in target browsers for fun.

What's included

16 videos

In this module, we will shift focus from offensive to defensive strategies, teaching you how to safeguard your Wi-Fi network from the attacks covered in previous sections. You will learn to protect your access points, detect ARP poisoning using tools like XARP and Wireshark, and prevent ARP table modifications by configuring MAC address tables. Additionally, we will demonstrate how to identify and kill Meterpreter sessions, ensuring your network and devices remain secure from malicious backdoor access.

What's included

5 videos1 assignment

In this module, we will explore how to gain full access to connected devices. You will learn to create encrypted, undetectable backdoors using the Veil-evasion tool, and test these backdoors on target devices. We'll show you how to deploy fake browser updates to hack clients and demonstrate the process of setting up listeners for incoming connections. Additionally, you will learn to interact with the target computers using Meterpreter command line, focusing first on the most practical commands, followed by more advanced and entertaining commands for extended control.

What's included

5 videos

In this module, we will explore additional techniques that complement the main course content. You will learn how to disconnect paired Bluetooth devices by scanning for nearby devices and sending disconnection packets. This module provides practical knowledge on interfering with Bluetooth connections and implementing defensive strategies to protect your own devices. Additionally, we will analyze the impact of Bluetooth disconnection attacks on device functionality and security.

What's included

1 video2 assignments

Instructor

Packt - Course Instructors
Packt
375 Courses14,912 learners

Offered by

Packt

Recommended if you're interested in Networking

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Networking? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions