Duration: 5 hours
80 Video Lessons
0101 Introduction And About The Author
0102 What We Will Cover
0103 System Requirements
0104 Legal Issues
0105 Penetration Testing
0201 802.11 Basics
0202 Frequencies
0203 Access Points
0204 Ad-Hoc Versus Infrastructure Mode
0205 Wireless Modes - ABGN
0206 SSID, ESSID And BSSID
0207 MAC Address
0208 Associations
0209 Beaconing And Broadcasting
0210 Access Point Basics
0211 Enterprise Networks
0212 WiFi In Windows
0213 WiFi In Mac OS
0214 WiFi In Linux
0301 Authentication
0302 802.1X
0303 Radius
0304 Encryption
0305 WEP
0306 WPA
0307 WPA2
0308 WPS
0309 EAP
0310 Hiding Your Network
0311 Filtering
0312 Network Segmentation
0313 Default Configurations
0401 Built-In Tools
0402 Kali Linux
0403 Kismet
0404 Aircrack-Ng
0405 WiFi Explorer
0406 Wireshark
0407 Wireless Attack Toolkit
0408 NetStumbler
0409 Ettercap
0410 Dsniff
0411 Airpwn
0412 Aireplay-Ng
0413 Fern
0414 WiFi Tap
0415 Cowpatty
0416 WiFi-Honey
0501 Using Wireshark
0502 Capturing Network Packets
0503 Monitor Mode
0504 Investigating Packets
0505 Filtering
0506 Radio Traffic
0507 War Driving
0508 Frame Injection
0509 RADIUS Replay
0510 SSL Stripping
0511 De-Authentication
0512 Airodump
0513 Fake Authentication
0601 Replay Attacks
0602 Cracking WEP - Part 1
0603 Cracking WEP - Part 2
0604 Cracking WPA
0605 Rogue Access Points
0606 Man In The Middle Attacks
0607 MAC Changes
0701 Bluetooth Overview
0702 Bluetooth Authentication
0703 Bluetooth Profiles
0704 Bluesnarfer
0705 Blueranger
0706 BT Scanner
0707 Protecting Bluetooth
0708 Other Tools
0801 WiMax
0802 Near Field Communication
0803 ZigBee
0804 RFID
0901 What Have We Covered
0902 Next Steps
0903 Conclusion
It is really very helpful for us and I have gathered some important information from this blog.
ReplyDeletewireless network penetration testing and security auditing