├── V11476_Code File ├── New Text Document.txt ├── Thumbs.db ├── Shopping-List.png └── WiFi Hacking%2F Wireless Penetration Testing for Beginners (1.5 Hours).pdf ├── LICENSE └── README.md /V11476_Code File/New Text Document.txt: -------------------------------------------------------------------------------- 1 | https://www.virtualbox.org/ 2 | 3 | https://www.kali.org/ 4 | 5 | -------------------------------------------------------------------------------- /V11476_Code File/Thumbs.db: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/WiFi-Hacking-Wireless-Penetration-Testing-for-Beginners/HEAD/V11476_Code File/Thumbs.db -------------------------------------------------------------------------------- /V11476_Code File/Shopping-List.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/WiFi-Hacking-Wireless-Penetration-Testing-for-Beginners/HEAD/V11476_Code File/Shopping-List.png -------------------------------------------------------------------------------- /V11476_Code File/WiFi Hacking%2F Wireless Penetration Testing for Beginners (1.5 Hours).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/WiFi-Hacking-Wireless-Penetration-Testing-for-Beginners/HEAD/V11476_Code File/WiFi Hacking%2F Wireless Penetration Testing for Beginners (1.5 Hours).pdf -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2018 Packt 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | # WiFi Hacking: Wireless Penetration Testing for Beginners 5 | This is the code repository for [WiFi Hacking: Wireless Penetration Testing for Beginners](https://www.packtpub.com/application-development/wifi-hacking-wireless-penetration-testing-beginners-video), published by [Packt](https://www.packtpub.com/?utm_source=github). It contains all the supporting project files necessary to work through the video course from start to finish. 6 | ## About the Video Course 7 | This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks. 8 |

What You Will Learn

9 |
10 |
16 | 17 | ## Instructions and Navigation 18 | ### Assumed Knowledge 19 | To fully benefit from the coverage included in this course, you will need:
20 |
21 |
  • Anyone who is interested in understanding the vulnerabilities in wireless security standards such as WEP, WPA, and WPA2. Anyone who wants to learn how to conduct wireless network hacking as part of a penetration test
  • 22 |
    23 | 24 | ### Technical Requirements 25 | This course has the following software requirements:
    26 | N/A 27 | 28 | ## Related Products 29 | * [Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) [Video]](https://www.packtpub.com/application-development/learn-wi-fi-password-penetration-testing-wepwpawpa2-video) 30 | 31 | * [Learn Network Hacking From Scratch (WiFi and Wired) [Video]](https://www.packtpub.com/application-development/learn-network-hacking-scratch-wifi-and-wired-video) 32 | 33 | * [Complete Ethical Hacking and Penetration Testing for Web Apps [Video]](https://www.packtpub.com/networking-and-servers/complete-ethical-hacking-and-penetration-testing-web-apps-video) --------------------------------------------------------------------------------