Kali Linux (کالی لینوکس) یک توزیع لینوکس مبتنی بر دبیان است که در درجه اول برای تست نفوذ و جرم شناسی دیجیتال طراحی شده است. این محصول دسترسی شما را به یک مجموعه بزرگ از ابزارهای امنیتی برای تست حرفه ای امنیت را فراهم می کند. در دوره Kali Linux Advanced Wireless Penetration Testing در مورد انواع مختلف ابزارها و تکنیک ها برای پیدا کردن شبکه های بی سیم مخفی و دستگاه های بلوتوث مورد بررسی قرار میگیرد. شما با نحوه جمع آوری اطلاعات شبکه بی سیم، کرک کردن پسورد، اتصال به هر شبکه بی سیم آسیب پذیر و دستگاه بلوتوث را در طول دوره آموزشی تمرین خواهد شد…
لینک دانلود ویدئو آموزشی Kali Linux Advanced Wireless Penetration Testing
دانلود – حجم : 979 مگابايت
رمز فايل: technet24.ir
Course Length 4 hours and 3 minutes
Aubrey Love II, Vijay Kumar Velu
Thursday, May 3, 2018
Kali Linux is a Debian-based Linux distribution designed primarily for Penetration Testing and Digital Forensics. It gives access to a large collection of security-related tools for professional security testing.
In this course, you will be discussing the different variety of tools and techniques to find hidden wireless networks and Bluetooth devices. You will learn how to enumerate the wireless network, cracking passwords, getting connected to any vulnerable wireless network and Bluetooth device. All the exercise in this course will be hands-on throughout this training.
The end goal of this course is to be able to connect, enumerate, extract information to any wireless-enabled device and network by utilizing various tools and software programs.
Style and Approach
This video course uses a step-by-step approach via real-world attack scenarios to help you master wireless penetration testing techniques.
Table of Contents
Wireless Lab Setup
Advanced Wireless Sniffing
Man in the Middle Attacks
Denial of Service Attacks
Detecting Hidden Bluetooth Device
Hacking Bluetooth Devices
What You Will Learn
Get familiar with Wi-Fi network protocols
Find open and hidden SSID’s and crack Wi-Fi passwords
Perform a Man in the Middle attack
Curate a DoS attack on our victim
Scan for all nearby Bluetooth devices
Hack all Bluetooth devices
Aubrey Love II
Aubrey Love II certified website master, avid hacktivist, and active journalist. He started his programming career out on a Commodore Vic-20 on which he builds his first Hello World app. He has built several websites, mobile apps, and Windows applications. Also, he has been a Linux System Administrator, Ethical Hacker, Website Master, Mobile Developer, Application Creator, and Game Developer.
Vijay Kumar Velu
Vijay Kumar Velu is a passionate information security practitioner, author, speaker, and blogger. He is currently working as associate director in one of the Big4 based in Malaysia. He has more than 11 years of IT industry experience, is a licensed penetration tester, and has specialized in providing technical solutions to a variety of cyber problems, ranging from simple security configuration reviews to cyber threat intelligence and incident response. He also holds multiple security qualifications, including Certified Ethical Hacker, EC-council Certified Security Analyst, and Computer Hacking Forensics Investigator.
Vijay has been invited to speak at the National Cyber Security Summit (NCSS), Indian Cyber Conference (InCyCon), Open Cloud Conference, and other ethical hacking conferences held in India, and he has also delivered multiple guest lectures and training on the importance of information security at various business schools in India.
He has authored a book entitled Mobile Application Penetration Testing, and also reviewed Learning Android Forensics, Packt Publishing.
For the information security community, Vijay serves as a member of the board in Kuala Lumpur for Cloud Security Alliance (CSA) and the chair member of the National Cyber Defense and Research Center (NCDRC) in India. Outside work, he enjoys playing music and doing charity.
Vijay is an early adopter of technology and always listens to any crazy ideas—so if you have an innovative idea, product, or service, do not hesitate to drop him a line.