This video provides a disclaimer regarding the integrity of pen testing web sites and tools.
- [Instructor] This is one of a series of Ethical Hacking courses. And in addition to Kali Linux, it uses a range of third-party testing software. Some of this is commercial software and some is open-source third-party software. The download and installation instructions for all tools used in this course is available as a PDF in the associated course material. However, some of the wireless drivers used in these tools may conflict with others, so you may wish to just install the tools for the time they're required.
While we've done our best to ensure that the tools we use and the sites we reference are legitimate, testing sites can be targets for hackers, and we can't provide any assurance that these sites might not be compromised when you visit them. Some of the sites which store the testing tools are detected as dangerous because the tools have similar signatures to malware, and may raise antivirus alerts when you visit them. The testing tools we demonstrate are extremely powerful. They may demonstrate some of the same signature characteristics as malware and malicious implants, and may raise antivirus alerts when you try to download them.
Again, we can't provide assurance that the software hasn't been compromised when you download it. And so, as for any other software from the internet, you need to exercise due diligence and take personal responsibility for anything you load onto your system. The testing is mostly carried out inside a virtual environment to contain any unplanned effects of testing tools, and in the unlikely event that you do download malware, this will also help contain any impact from live malware.
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic WiFi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things