- Регистрация
- 27 Авг 2018
- Сообщения
- 37,500
- Реакции
- 533,927
- Тема Автор Вы автор данного материала? |
- #1
What you'll learn:
- More the 90 detailed videos explain how to use Raspberry Pi for Penetration Testing
- Learn tons of Linux commands & interact with Terminal
- What Raspberry Pi is
- Build your own Portable Hacking Device
- Configure Raspberry Pi with Kali Linux properly
- Take your Raspberry Pi Everywhere
- Connect to Raspberry Pi wirelessly via SSH using PC/Laptop/Smartphone
- Connect to Raspberry Pi over WAN
- Setup LCD Screen with Raspberry Pi
- Network Security Testing
- Carry out several Wi-Fi attacks without having the key
- Crack any WEP/WPA2 WiFi encryption using several methods
- Launch Evil Twin attack using your PC/Laptop/Smartphone
- Steal the users Social Network login Credentials
- Protect your WiFi network against all the explained attacks
- Hacking Windows 10 /8.1/8/7/Vista like the Black Hat Hackers
- Hacking Mac OSX with RP
- Hacking Linux Operating System with RP
- Hacking Linux and Mac OS using one command
- Hacking Windows, Mac OS and Linux over WAN
- Setup Raspberry Pi Zero for Hacking
- Hacking Windows/ Linux just by plugging the Raspberry Pi Zero
- Stealing locked Windows/Mac login Credentials
- Escalate your privileges in Windows/ Mac OS and Linux
- Interact with the Compromised Operating System
- Maintaining Access in Windows,Mac OSX and Linux
- Connect securely to Raspberry Pi using VPN
- Build a TOR Router with Raspberry Pi
- Basic IT skills
- PC/Laptop
- Raspberry Pi 3 & Zero
- ALFA AWUS036ACH & AWUSO36NH
This course is intended for beginners and professionals, if you are a beginner you will start from zero until you become an expert level, and if you are a professional so this course will increase your knowledge about the hacking.
In this course, you'll learn how the Black Hat Hackers use the Raspberry Pi to implement remotely advanced hacking techniques to Crack WEP/WPA2 Wi-Fi encryption key and to Compromise Windows, Linux and Mac OSX operating systems by setting up the Raspberry Pi 3 as a server and Raspberry Pi zero as the hacking hardware.
The course is divided to eleven sections:
Configure Raspberry Pi: In this section, you'll learn what Raspberry Pi is and what it is used for, and also the section focuses on configuring the Raspberry Pi to run Kali Linux properly, and also it discovers solving for the issues that you may face during setting up the Raspberry Pi , you'll also learn how to setup an LCD display to your Raspberry Pi 3.
Connecting to Raspberry Pi: After learning how to configure and deal with the Raspberry Pi 3, in this section you'll learn multiple ways to connect to your Raspberry Pi using your PC/Laptop, Android and iPhone smartphones wirelessly or using USB cable to connect to Raspberry Pi GUI (Graphical User Interface) via VNC server and to its CLI (Command Line Interface) via SSH.
Network Basics: This section explains the basic concepts of the networks that you have to understand before you get into Wi-Fi hacking it will elaborate you the difference between Managed & Monitor modes in Wi-Fi cards and also it will explain what the Mac Address is and how to spoof it.
Pre-Connection Attacks: This section teaches you the attacks that you can carry out against any Wi-Fi access point without having to be associated with it, these attacks are very important to understand and learn because it's the key of the next Wi-Fi cracking section.
Cracking WEP Wi-Fi Key using Raspberry Pi: This section focuses on explaining what WEP encryption is and different methods types to crack WEP Wi-Fi key, this section focuses on the practical side without neglecting the theory behind each attack.
Hacking Wi-Fi Access point by Cracking the Password: This is the first section of Hacking WPA/WPA2 Key series where it is going to focus on cracking WPA2 Wi-Fi key using dictionary attack, it will show you how to implement the attack using your Raspberry Pi, your computer CPU and also cracking the key much faster using your computer GPU.
Hacking any Wi-Fi access point using Raspberry Pi (Without Wordlist): This section shows you the last option or the last attack that you can use to steal WPA2 Wi-Fi key without using a wordlist, this done by using Evil Twin attack that will jam and clone the target access point and broadcast it to force the target to connect to it and type the key.
Setup Raspberry Pi 3 to Hack Windows, Linux, Mac OSX: This section discovers setting up the Raspberry Pi 3 to work as a server to listen for a reverse connection from the target OS and it also explains how to create a stager or payload for Windows, Linux and Mac OSX that will give us access to the target OS and lastly it shows you how to get a reverse connection over WAN.
Hacking Windows/Linux just by plugging Raspberry Pi Zero: This section will take you step further by teaching you how to use Raspberry Pi Zero w to gain access to any Windows or Linux operating system just by plugging it to the targeted computer and it also explains stealing and crack locked Windows login credentials just by plugging it to the target computer.
Post Exploitation (Windows, Linux): After learning how to gain access to any Windows and Linux OS, this section will continue with you by explaining the attacks that can be launched on the target machine like maintaining your access for later use or escalating your privileges to an administrator or root, or to run some modules that will give you more sensitive information about the compromised machine.
Bonus Section: This section contains all the extra lectures that i'll added to this course and 95% discounts on all my Ethical Hacking Courses to improve your hacking skills.
The Recommended Wi-Fi Chipsets:
- RTL8812AU (supports 5/2.4Ghz)
- Atheros AR9271 (supports 2.4Ghz)
- these Attacks work against any Windows OS whether it’s Windows 10/8.1/8/7/Vista etc....
- You must practice what you've learned to become an advanced level, because this course focuses on both practical and theoretical side.
- This course is going to be always up to date.
- If you have any question or any problem send me a message and I’ll be glad to response.
- After finishing this course, you will get a certificate directly from Udemy.
- All the people who enrolled in this course will get discounts for future courses.
- All the Rights are Reserved to Saad Sarraj no other Organization is involved.
- Anyone wants to become an Ethical Hacker/Penetration tester
- Anyone who wants to Learn using Raspberry Pi for Penetration Testing
- Anyone Who wants to Test the Security of a Wi-Fi Networks
- Anyone who wants to Learn how Black Hat Hackers hack the Operating Systems
DOWNLOAD: