* Cantinho Satkeys

Refresh History
  • JPratas: try65hytr Pessoal  h7ft6l k7y8j0
    Hoje às 03:51
  • j.s.: try65hytr a todos  4tj97u<z
    30 de Outubro de 2024, 21:00
  • JPratas: dgtgtr Pessoal  4tj97u<z k7y8j0
    28 de Outubro de 2024, 17:35
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  k8h9m
    27 de Outubro de 2024, 11:21
  • j.s.: bom fim de semana   49E09B4F 49E09B4F
    26 de Outubro de 2024, 17:06
  • j.s.: dgtgtr a todos  4tj97u<z
    26 de Outubro de 2024, 17:06
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana
    26 de Outubro de 2024, 11:49
  • JPratas: try65hytr Pessoal  101yd91 k7y8j0
    25 de Outubro de 2024, 03:53
  • JPratas: dgtgtr A Todos  4tj97u<z 2dgh8i k7y8j0
    23 de Outubro de 2024, 16:31
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    23 de Outubro de 2024, 10:59
  • j.s.: dgtgtr a todos  4tj97u<z
    22 de Outubro de 2024, 18:16
  • j.s.: dgtgtr a todos  4tj97u<z
    20 de Outubro de 2024, 15:04
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  101041
    20 de Outubro de 2024, 11:37
  • axlpoa: hi
    19 de Outubro de 2024, 22:24
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    19 de Outubro de 2024, 11:31
  • j.s.: ghyt74 a todos  4tj97u<z
    18 de Outubro de 2024, 09:33
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    18 de Outubro de 2024, 03:28
  • schmeagle: iheartradio
    17 de Outubro de 2024, 22:58
  • j.s.: dgtgtr a todos  4tj97u<z
    17 de Outubro de 2024, 18:09
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    17 de Outubro de 2024, 09:09

Autor Tópico: Hacking Wireless Networks. Theory and practice  (Lida 236 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online mitsumi

  • Moderador Global
  • ***
  • Mensagens: 115351
  • Karma: +0/-0
Hacking Wireless Networks. Theory and practice
« em: 07 de Outubro de 2019, 12:53 »

Hacking Wireless Networks. Theory and practice
.MP4 | Video: 1152x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 838 MB
Duration: 3 hours | Genre: eLearning | Language: English
38% of secured Wi-Fi networks are vulnerable to the attack which can be carried out by a 12-year-old in 4 minutes! HOW?

What you'll learn

    Lectures in PDF + Live Video Training
    Free Training Operating System you can download
    attacks on WEP
    attacks on WPA
    attacks on WPA2
    preparation of rainbow tables
    various Wi-Fi hacking techniques
    securing a wireless network
    Wi-Fi hacking essentials

Requirements

    interest in ITsec and ethical hacking
    basic IT knowledge

Description

LAST UPDATED: 09/2019

Welcome to Hacking School!

Ethical Wireless Network Hacking Course:
Hacking Wireless Networks. Theory and practice.

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world - beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

This course covers all the important techniques related with WIRELESS NETWORK (or WiFi) HACKING used by hackers, system administrators and pentesters.

Wireless networks are all around us. You want it or not, you ARE part of this system. As new wireless encryption-standards are being developed, new attack techniques are being discovered and presented at the same time. It's a real arms race.

Either you want to make your home WiFi network more secure, you want to recover a forgotten password, or you want to break into your wireless network to prove it is secure - regardless of the WiFi encryption-type used (WEP, WPA, WPA2), you will find the answer in this course.
 
What you can expect from this course:

    You will get access to over 60 interesting lectures on Wireless Network Hacking

    You can download the course Handbook in PDF (over 180 pages)

    You can download the Training Operating System v2.0 CE (CUDA Extension) which is equipped with all the tools described in this course

    It is a step by step training on WiFi ethical hacking

    It covers over 25 different Wireless Network Hacking techniques and experiments

    This course can be treated as a valuable source of knowledge by white- and blackhat hackers, pentesters and network analysts

    You can get access to all the source codes and tools described in the course - it's already prepared for you in the Training Operating System environment

    You can boot the Training Operating System from CD/DVD or start it inside a virtual machine (using VirtualBox on Windows and VMware Fusion on MAC OSX)
 
What you need to know before you begin:

    This ethical hacking course is intended to help you regardless of your current knowledge and skills. All you need is a basic computer knowledge and our Training Operating System v2.0 (you will also get access to it!).

    We will show you how to prepare your training environment. In this environment you can experiment freely, without doing harm to anybody.

    You will find all the source codes and examples inside your Training OS to avoid unnecessary code retyping.

    Most of the modules (lessons) contain the attack related part, as well as a guidance to protect your own wireless network.

    What you will find inside can also be used by beginners - thanks to live Video Training attached to the course.
 
The complete list of all the video training sessions included in this course:

    The configuration of wireless network card modes

    Changing the MAC address of the wireless network card

    Finding a hidden access point with disabled ESSID broadcast

    The use of deauthentication attack for jamming network traffic

    The overview and demonstration of the chop-chop attack

    Generating packets without knowing the network key

    Interactive packet replay and ARP request replay

    The demonstration of the PTW and KoreK attacks

    Creating a fake access point - the Caffe Latte attack

    The dictionary attack on WPA/WPA2

    The dictionary attack on WPA/WPA2 - using hash tables

    CUDA - the initial preparation of the environment

    The installation of CUDA-SDK and CUDA-Toolkit

    The compilation and installation of the tools with CUDA support

    The optimization of the parameters of an nVidia video card

    CUDA - preparation for the attack

    CUDA - the attack on WPA/WPA2

    Generating your own dictionary

    Applications for cracking MD4 and MD5 hashes with the use                                                                                                                                                                                                of CUDA technology

Please be advised that all the techniques presented in this course can only be used ethically and in your own testing / researching environment. Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.

We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if this course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || Hacking School Team

Who this course is for:

    students interested in wireless networks hacking
    system / network administrators
    geeks and wannabes
    everyone interested in hacking in general
    CEH, CISSP, MCSE, CCNA
    ethical hackers
     

               

Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction