Jerod walks through a demo of the Aircrack-ng suite. In this demo, he shows you how to use the suite's tools to identify nearby wireless access points, target a specific access point, force a wireless client to deauthenticate from that access point, intercept the wireless encryption key, and crack that wireless encryption key offline.
- [Instructor] In Kali Linux, I'd like to show you…how to connect a wireless network adapter…to your virtual machine…so that you can take full advantage…of the Aircrack suite.…As I mentioned earlier,…it's best to have a wireless network adapter…with a Realtek chipset,…and if that's USB-enabled,…you can plug it into your testing machine,…and then in the Virtual Box screen,…go to Devices, USB, and then just select…the wireless adapter that you'd like to connect to the VM.…
It should be that simple.…In a terminal window, let's run iwconfig,…the wireless networking utility,…just to make sure that we have a wireless networking adapter…that the Kali image can see.…And there we go, wlan0, perfect.…So clear the screen, and if you run airmon-ng,…you'll get a list of all the wireless network adapters…with which airmon can interact.…So what I'd like to do is run the airmon utility again,…and then I want to tell it to start the interface wlan0.…
What this is going to do is put…our wireless network adapter into monitor mode,…
Note: This course aligns with the National Institute of Standards and Technology (NIST) special publication on information security testing (SP 800-115).
- Identifying the five major types of security assessments
- Defining the security assessment life cycle
- Setting up your testing environment
- Planning a security assessment
- Reviewing documentation, logs, and more
- Identifying test targets
- Testing for password and other security vulnerabilities
- Drafting and delivering your report
Skill Level Beginner
Security Testing: Nmap Security Scanningwith Mike Chapple1h 46m Intermediate
Troubleshooting Your Network with Wiresharkwith Lisa Bock2h 35m Intermediate
DevSecOps: Automated Security Testingwith James Wickett1h 35m Intermediate
What you should know1m 49s
1. Understanding Security Assessments
2. Your Testing Environment
3. Planning Your Assessment
4. Review Techniques
5. Identifying Your Targets
6. Vulnerability Validation
7. Additional Considerations
Next steps3m 39s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.