![]() |
Wifi Ethical Hacking: Hak5 Wifi Pineapple & Hackrf One
![]() Wifi Ethical Hacking: Hak5 Wifi Pineapple & Hackrf One Published 5/2025 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 3.97 GB | Duration: 5h 28m A step-by-step guide to pen-test Wifi Protection including WPA3 & 5GHz band using Hak5 WiFi Pineapple and HackRF One SDR What you'll learn Setting Up Wifi Pineapple Scanning and Monitoring Wifi Networks Packet Injection Rogue Access Points Identify Security Protocols Build custom captive portals Impersonating public open access points using Karma Attacks Disconnect target clients from access points Using DragonOS for HackRF One Build wifi jammer app with Gnu Radio Companion Bypass WPA3, PMF and SAE Retrieving access point passwords without handshakes Executing deauth attacks Running wifi jamming on specific channels Pen-test 5GHz Wifi Bands Defend aginst Evil Twin Attacks Defence Strategies against Wifi Jamming and more . . . Requirements Hak5 Wifi Pineapple Mark VII Alfa AWUS036ACM Wifi Adapter (Optional) HackRF One SDR Description Step into the cutting-edge world of wireless ethical hacking and learn how to test and secure WiFi networks using two of the most powerful tools in the cybersecurity arsenal: the Hak5 WiFi Pineapple and the HackRF One. This course is designed for cybersecurity enthusiasts, ethical hackers, penetration testers, and anyone interested in mastering wireless network security through hands-on, practical exercises.You will explore how attackers exploit vulnerabilities in WiFi networks and how to defend against these attacks effectively by knowing how the attacks are executed. All demonstrations are performed in a controlled, ethical environment.What You'll Learn:Set up and configure the Hak5 WiFi Pineapple for ethical hacking and penetration testing.Perform WiFi reconnaissance to identify access points and clients, and gather critical network information.Identify WiFi targets and the protocols used, and understand how they can be bypassed.Build customized captive portals, learning to retrieve access point passwords with custom-made captive portals.Understand the weaknesses of WPA3, Protected Management Frames (PMF), and Simultaneous Authentication of Equals (SAE) - traditional packet capture and deauthentication attacks are obsoleted by WPA3, PMF, and SAE, but hackers can still bypass them with WiFi Pineapple captive portals and HackRF One targeted channel jamming.Why Enroll?This course provides a real-world, hands-on approach to WiFi ethical hacking, combining the reconnaissance and exploitation power of the WiFi Pineapple with the advanced radio frequency manipulation capabilities of the HackRF One. You will not only learn the tools and techniques but also gain insight into modern WiFi protections like WPA3, PMF, and SAE - and how these can still be challenged through strategic jamming attacks.Whether you're an aspiring ethical hacker wanting to break into wireless security or a seasoned penetration tester seeking to expand your skill set into advanced RF-based attacks, this course gives you the knowledge, tools, and practical experience to test and secure wireless networks effectively.Get ready to master WiFi ethical hacking and take your cybersecurity skills to the next level - enroll today, and I will see you inside! Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 Unboxing the Hak5 Wifi Pineapple Mark VII and Alfa AWUS036ACM Lecture 3 Setting Up The Wifi Pineapple Lecture 4 Simple Lab Setup Lecture 5 (Optional) Lab Setup Section 2: Recon Scans Lecture 6 Scanning Using WebUI Lecture 7 Scanning Using the Command Line Lecture 8 Recon Scans for 5GHz bands Using Alfa AWUS036ACM Lecture 9 How To Add and Remove SSIDs Lecture 10 Web-based way to add and remove PineAP Pool Section 3: Deauthentication Attacks and Cracking Handshake Files Lecture 11 Deauthentication Attacks Using WebUI Lecture 12 Deauthentication Attacks Using Command Line and Capturing Handshakes Lecture 13 Cracking the Handshake File Section 4: Targetted Wifi Channel Jamming Using HackRF One Lecture 14 Unboxing HackRF One Lecture 15 (Optional) Plugging in a TXCO Oscillator into HackRF One Lecture 16 Installing DragonOS virtual machine in Oracle Virtual Box Lecture 17 (Optional) Installing DragonOS in Raspberry Pi 400 Lecture 18 (Optional) Unboxing RTL-SDR v3 Lecture 19 Introduction to HackRF SDR and Gnu Radio Companion Lecture 20 Building a Targetted Channel Wifi Jammer Lecture 21 Testing Our Wifi Jammer Section 5: Impersonating Access Points Using Karma Attacks Lecture 22 Introduction to Wifi Karma Attacks Lecture 23 Practical on Wifi Karma Attacks Section 6: Evil Twin Attacks Lecture 24 Introduction to Evil Twin Attacks Lecture 25 Setting Up Wifi Pineapple for Evil Twin Attacks Lecture 26 Installing Captive Portals Lecture 27 Building a Customized Captive Portal Lecture 28 Evil Twin Attack Strategies Section 7: How to Defend Against Evil Twin Attacks and Wifi Jamming Lecture 29 How to Defend Against Evil Twin Attacks and Wifi Jamming Section 8: Resources For Further Study Lecture 30 Resources for further study Students studying Wifi Security,Penetration Testers and Ethical Hackers,Cybersecurity Enthusiasts,Anyone interested in how latest Wifi Security could be bypassed Цитата:
|
Часовой пояс GMT +3, время: 05:38. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot