Cybersecurity Basics & WiFi Cracking

May 30, 2024

Cybersecurity Basics & WiFi Cracking

Introduction

  • Emphasis on the importance of cybersecurity and the growing need for hackers.
  • An anecdote about a 17-year-old who hacked GTA 6 servers.
  • Assurance that the course is beginner-friendly and doesn't require prior coding knowledge.

Overview of Course Modules

  1. Foot Printing and Reconnaissance: Extracting website history and data.
  2. Network Scanning: Analyzing website networks and connected domains.
  3. Vulnerability Analysis: Identifying website vulnerabilities.
  4. System Hacking: Methods to bypass system passwords.
  5. Malware Threads: Overview of viruses, trojans, etc.
  6. Sniffing and Social Engineering: Techniques to deceive users.
  7. Denial of Service Attacks (DoS): Methods to take down websites using multiple requests.
  8. Session Hijacking: Hijacking sessions without passwords.
  9. IDS, Firewalls, and Honeypots: Explaining basic cybersecurity defense tools.
  10. Web Server and Application Hacking: Differences and hacking methods.
  11. SQL Injection: Exploiting SQL vulnerabilities to bypass login and access databases.
  12. Hacking Wireless Networks: Bluetooth and WiFi hacking.
  13. Mobile Platform Hacking: Android and iOS hacking.
  14. IoT and OT Hacking: Targeting Internet of Things devices.
  15. Cloud Computing: Basics of cloud computing and encryption.
  16. Cryptography: Techniques hackers use to encrypt hijacked data and how to protect oneself.

Basics

Operating Systems

  • Importance of understanding operating systems used for hacking (Kali Linux, Parrot OS).
  • Steps to install and use Kali Linux.

Virtual Machines

  • Using virtual machines for hacking (VMware and VirtualBox).
  • Setting up Kali Linux in a virtual machine.

Live Booting

  • Using live boot for hacking WiFi networks.
  • Methods to create a bootable USB for live booting.

Terminal Basics

  • Commands to manage directories (ls, cd, cat, etc.).
  • Difference between root and normal users.

Networking

IP Addresses

  • Types of IP addresses (IPv4 vs. IPv6).
  • Breakdown of IP address components and classes (Class A, B, C, D, E).
  • Public vs. Private IP addresses.
  • How network and host portions work.
  • Understanding subnet masks.
  • CIDR (Classless Inter-Domain Routing) for efficient subnetting.

MAC Addresses

  • Uniqueness and importance of MAC addresses.
  • Methods to change MAC addresses for anonymity.

Ports

  • Explanation of ports and their roles in networking.
  • Different protocols (UDP vs. TCP).
  • Well-known services and assigned ports.

URLs and DNS

  • Breakdown of URL components and their significance.
  • DNS server roles in converting domain names to IP addresses.

Advanced Information Gathering

Using Google for Information Gathering

  • Techniques like filetype, site, intitle, and inurl operators to gather data from Google.
  • PHishing Attacks
  • Phishing Attack: What are phishing attacks and how attackers use fake web pages to steal credentials. Demonstrated using PiFisher tool.

WiFi Hacking

Understanding Handshake Files

  • Process of how devices connect to WiFi.
  • How handshake files are generated and their significance.

Deauthentication Attack

  • Methods to deauthenticate a device and capture handshake files.
  • Using tools like WiFite for automating WiFi attacks.

Brute Force Attacks

  • Using wordlists to crack hashes obtained from handshake files.
  • Tools and commands to perform brute force attacks.

Creating Custom Wordlists

  • Using CUPP (Common User Password Profiler) to create targeted wordlists.

WPS Pin Cracking

  • Exploiting WPS vulnerability to extract WiFi passwords using brute force and pixie dust attacks.

Security Measures

  • Disabling WPS to prevent exploits.
  • Using strong passwords on WiFi networks.

Are You Hacked?

  • Checking email addresses for breaches using HaveIBeenPwned.com.
  • Using password managers to store strong, unique passwords for every site.