Cyberhacker Series: Wireless Hacking Ninja

Cyberhacker Series: Wireless Hacking Ninja
189.99 USD
Buy Now

Cyberhacker Series: Wireless Hacking NinjaThis course is for beginners and IT pros looking to learn more about wireless hacking. What are the pre-requisites for this course?Students should have a working understanding of TCP/IP and networking concepts. What will you be able to do after taking this course?Wireless Hacking with Kismet -Kismetis a network detector, packet sniffer and intrusion detection systemfor 802.11 Wireless LANs. Kismet will work with any wireless card which supports raw monitoring modeand can sniff 802.11a, 802.11b, 802.11g and 802.11n traffic. The program runs under Linux and OSX. Wi-Fi Pineapple -The WiFi Pineapple NANO and TETRA are the 6th generation auditing platforms from Hak5. Thoughtfully developed for mobile and persistent deployments, they build on over 8 years of WiFi penetration testing expertise. WiFi man-in-the-middle platformHighly effective rogue AP suiteOver-the-air apps and modulesAdvanced client and AP filteringIntuitive web interfaceSimplified auditing workflowLive reconnaissance viewAt-a-glance intelligenceDevice tracking and alertingReports emailed at set intervalsBuilt on embedded LinuxFree software updatesUbertooth -The Ubertooth One is an opensource Bluetooth test tool from Michael Ossmann. It is the world’s first affordable Bluetooth monitoring and development platform and is a fully open source product (both hardware and software).Bluetooth Low Energy Hacking -Bluetooth Low Energy (BLE), sometimes referred to as “Bluetooth Smart”, is a light-weight subset of classic Bluetooth and was introduced as part of the Bluetooth 4.0 core specification. While there is some overlap with classic Bluetooth, BLE actually has a completely different lineage and was started by Nokia as an in-house project called ‘Wibree’ before being adopted by the Bluetooth SIG. Hacking Wireless with Metasploit -TheMetasploit Projectis a computer securityproject that provides information about security vulnerabilitiesand aids in penetration testing and IDS Signaturedevelopment. Its best-known sub-project is the open sourceMetasploit Framework, a tool for developing and executing exploitcode against a remote target machine. Other important sub-projects include the Opcode Database, shell codearchive and related research. The Metasploit Project is well known for its anti-forensicand evasion tools, some of which are built into the Metasploit Framework. Aircrack -Aircrack-ngis a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools. Attacking: Replay attacks, deauthentication, fake access points and others via packet injection. Testing: Checking WiFi cards and driver capabilities (capture and injection).Cracking: WEP and WPA PSK (WPA 1 and 2).Reaver -Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target APs plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase