In this course, you will learn how to set up your Kali Linux lab environment properly, understand device communication, and master Man in the Middle (MITM) attacks. The course is divided into six sections:
Recommended experience
What you'll learn
Learn to set up your Kali Linux environment
Detect ARP Poisoning (MITM) attack to protect yourself against it
Carry out several attacks without having the key
Gain access to any client account in the Wi-Fi network
Details to know
Add to your LinkedIn profile
September 2024
5 assignments
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 11 modules in this course
In this module, we will welcome you to the course, providing an overview of what to expect. We'll introduce the key topics and explain how they will be relevant to your learning journey and professional development.
What's included
1 video
In this module, we will cover the essential steps to prepare your system for the course. You'll learn how to set up Kali Linux as both a main operating system and within virtual machines using VirtualBox and VMware. We will also guide you through network configurations, performance enhancements, snapshot management, and updating procedures to ensure your environment is fully equipped for advanced tasks.
What's included
9 videos
In this module, we will delve into the basics of networking. You will gain an understanding of essential network concepts, including the role and manipulation of MAC addresses. Additionally, we will guide you through the installation of drivers for the ALFA AC1200 adapter and demonstrate how to enable monitor mode on your Wi-Fi adapter, equipping you to capture packets within your Wi-Fi range.
What's included
4 videos1 assignment
In this module, we will focus on gathering crucial information about access points before attempting to crack their security. You will learn how to scan for available Wi-Fi networks, capture packets, and analyze network traffic across different frequency bands. Additionally, we'll cover methods to disconnect devices, detect hidden networks, and jam access points, providing a comprehensive toolkit for pre-connection attacks.
What's included
7 videos
In this module, we will dive into the world of WEP encryption and its inherent weaknesses. You will explore the theory behind WEP encryption and learn various methods to crack it. Through detailed demonstrations, we will guide you on how to perform fake authentication, inject packets, and use specific attacks like Korek Chopchop, ARP Request Replay, and Hirte to efficiently crack WEP encryption keys. This comprehensive approach will equip you with practical skills for real-world applications.
What's included
8 videos
In this module, we will explore the intricacies of WPA and WPA2 encryption and various techniques to crack them. Starting with the theoretical foundation, we will cover practical methods such as using the WPS feature, capturing handshakes, and creating wordlists. You will learn to apply dictionary, brute-force, and Rainbow Table attacks, as well as leverage GPU power with hashcat. Additionally, we will demonstrate the powerful Evil Twin attack and teach you how to exploit routers to retrieve usernames and passwords. This comprehensive approach ensures you have the knowledge and tools to effectively crack WPA/WPA2 encryptions.
What's included
11 videos1 assignment
In this module, we will delve into the complexities of WPA-Enterprise Wi-Fi networks. You will gain a solid understanding of their structure and functionality before moving on to the practical aspects. We'll guide you through installing the required tools, creating a fake WPA-Enterprise network to deceive targets, and finally, cracking the captured hash with Hashcat. This module equips you with the skills needed to effectively target and compromise WPA-Enterprise networks.
What's included
4 videos
In this module, we will delve into the intricacies of Man-in-the-middle (MITM) attacks. You will learn the theory behind these attacks and how to gather detailed information about connected clients. We will guide you through performing ARP spoofing, capturing login credentials, bypassing SSL certificates, and redirecting clients to malicious sites. Additionally, you will learn to steal cookies, capture browser screenshots, inject keyloggers, HTML, and JavaScript, hook clients with Be EF, and steal social network accounts. Finally, we'll explore some entertaining commands to run in target browsers for fun.
What's included
16 videos
In this module, we will shift focus from offensive to defensive strategies, teaching you how to safeguard your Wi-Fi network from the attacks covered in previous sections. You will learn to protect your access points, detect ARP poisoning using tools like XARP and Wireshark, and prevent ARP table modifications by configuring MAC address tables. Additionally, we will demonstrate how to identify and kill Meterpreter sessions, ensuring your network and devices remain secure from malicious backdoor access.
What's included
5 videos1 assignment
In this module, we will explore how to gain full access to connected devices. You will learn to create encrypted, undetectable backdoors using the Veil-evasion tool, and test these backdoors on target devices. We'll show you how to deploy fake browser updates to hack clients and demonstrate the process of setting up listeners for incoming connections. Additionally, you will learn to interact with the target computers using Meterpreter command line, focusing first on the most practical commands, followed by more advanced and entertaining commands for extended control.
What's included
5 videos
In this module, we will explore additional techniques that complement the main course content. You will learn how to disconnect paired Bluetooth devices by scanning for nearby devices and sending disconnection packets. This module provides practical knowledge on interfering with Bluetooth connections and implementing defensive strategies to protect your own devices. Additionally, we will analyze the impact of Bluetooth disconnection attacks on device functionality and security.
What's included
1 video2 assignments
Recommended if you're interested in Networking
Why people choose Coursera for their career
New to Networking? Start here.
Open new doors with Coursera Plus
Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.