Coconote
AI notes
AI voice & video notes
Export note
Try for free
Cybersecurity Basics & WiFi Cracking
May 30, 2024
๐
Review flashcards
Cybersecurity Basics & WiFi Cracking
Introduction
Emphasis on the importance of cybersecurity and the growing need for hackers.
An anecdote about a 17-year-old who hacked GTA 6 servers.
Assurance that the course is beginner-friendly and doesn't require prior coding knowledge.
Overview of Course Modules
Foot Printing and Reconnaissance
: Extracting website history and data.
Network Scanning
: Analyzing website networks and connected domains.
Vulnerability Analysis
: Identifying website vulnerabilities.
System Hacking
: Methods to bypass system passwords.
Malware Threads
: Overview of viruses, trojans, etc.
Sniffing and Social Engineering
: Techniques to deceive users.
Denial of Service Attacks (DoS)
: Methods to take down websites using multiple requests.
Session Hijacking
: Hijacking sessions without passwords.
IDS, Firewalls, and Honeypots
: Explaining basic cybersecurity defense tools.
Web Server and Application Hacking
: Differences and hacking methods.
SQL Injection
: Exploiting SQL vulnerabilities to bypass login and access databases.
Hacking Wireless Networks
: Bluetooth and WiFi hacking.
Mobile Platform Hacking
: Android and iOS hacking.
IoT and OT Hacking
: Targeting Internet of Things devices.
Cloud Computing
: Basics of cloud computing and encryption.
Cryptography
: Techniques hackers use to encrypt hijacked data and how to protect oneself.
Basics
Operating Systems
Importance of understanding operating systems used for hacking (Kali Linux, Parrot OS).
Steps to install and use Kali Linux.
Virtual Machines
Using virtual machines for hacking (VMware and VirtualBox).
Setting up Kali Linux in a virtual machine.
Live Booting
Using live boot for hacking WiFi networks.
Methods to create a bootable USB for live booting.
Terminal Basics
Commands to manage directories (
ls
,
cd
,
cat
, etc.).
Difference between root and normal users.
Networking
IP Addresses
Types of IP addresses (IPv4 vs. IPv6).
Breakdown of IP address components and classes (Class A, B, C, D, E).
Public vs. Private IP addresses.
How network and host portions work.
Understanding subnet masks.
CIDR (Classless Inter-Domain Routing) for efficient subnetting.
MAC Addresses
Uniqueness and importance of MAC addresses.
Methods to change MAC addresses for anonymity.
Ports
Explanation of ports and their roles in networking.
Different protocols (UDP vs. TCP).
Well-known services and assigned ports.
URLs and DNS
Breakdown of URL components and their significance.
DNS server roles in converting domain names to IP addresses.
Advanced Information Gathering
Using Google for Information Gathering
Techniques like filetype, site, intitle, and inurl operators to gather data from Google.
PHishing Attacks
Phishing Attack: What are phishing attacks and how attackers use fake web pages to steal credentials. Demonstrated using PiFisher tool.
WiFi Hacking
Understanding Handshake Files
Process of how devices connect to WiFi.
How handshake files are generated and their significance.
Deauthentication Attack
Methods to deauthenticate a device and capture handshake files.
Using tools like WiFite for automating WiFi attacks.
Brute Force Attacks
Using wordlists to crack hashes obtained from handshake files.
Tools and commands to perform brute force attacks.
Creating Custom Wordlists
Using CUPP (Common User Password Profiler) to create targeted wordlists.
WPS Pin Cracking
Exploiting WPS vulnerability to extract WiFi passwords using brute force and pixie dust attacks.
Security Measures
Disabling WPS to prevent exploits.
Using strong passwords on WiFi networks.
Are You Hacked?
Checking email addresses for breaches using HaveIBeenPwned.com.
Using password managers to store strong, unique passwords for every site.
๐
Full transcript