By Waseem Akram on 11/14/2024
This course is designed to be hands-on and beginner-friendly, so even if you’re new to the world of network security, you’ll be able to follow along with ease. By the end, you'll have a
Hello everyone! I’m Waseem Akram, and I’m thrilled to introduce you to my completely free Wi-Fi hacking course! In this course, I’ll take you through every step, from the very basics to more advanced techniques, covering everything you need to know to perform comprehensive Wi-Fi audits and assess the security of various wireless networks.
This course is designed to be hands-on and beginner-friendly, so even if you’re new to the world of network security, you’ll be able to follow along with ease. By the end, you'll have a solid foundation and the tools needed to start auditing Wi-Fi networks on your own.
If you have any questions or need extra help, feel free to reach out to me on Discord my username is hackerwasii.
Disclaimer: This course is intended solely for educational and ethical purposes. I am not responsible for any misuse of the information provided.
To perform the tasks and various Wi-Fi attack techniques covered in this course, there are a few essential requirements to keep in mind:
One crucial piece of equipment you’ll need is a network antenna that supports monitor mode. You might be wondering, “Why is this necessary?” Here’s why: to inject Wi-Fi packets into the network, a typical antenna (like those built into most laptops and PCs) won’t be effective. You need a specialized network antenna capable of monitor mode, which allows the system to capture and inject packets freely, providing the flexibility needed for Wi-Fi auditing.
You’ll also need a compatible operating system to conduct these attacks. Although this course won’t cover OS installation, there are plenty of online guides for installing systems like Kali Linux, Parrot OS, or Wifislax (a distribution specifically designed for Wi-Fi hacking).
Based on my experience, I recommend Parrot OS. While Kali Linux may require driver installations to support the network antenna, Parrot OS generally does not. When I first plugged in my antenna with Parrot, it worked right away—no setup needed!
Note: Choose an OS that suits your setup and ease of use, and ensure your network antenna is properly configured for the best experience during the course.
Selecting the right network antenna can make a significant difference in your Wi-Fi auditing experience. Personally, I use the Alfa AWUS036ACM, and I can attest that it's worth the investment (priced around €46 in the official European store). This model performs excellently on both 2.4 GHz and 5 GHz frequencies.
To choose the antenna that best fits your needs, consider the following factors:
Here’s a list of recommended antennas that are known for their performance and reliability:
For more details on compatible antennas, check out the official Airgeddon Wiki for additional guidance.
If you’ve got your antenna ready, power up your Kali or Parrot OS and prepare yourself, because today you’re going to learn how to perform various attacks and techniques to fully audit Wi-Fi networks. While some automatic tools allow you to conduct attacks without any technical knowledge, they don’t teach you the essential principles or techniques behind Wi-Fi auditing. I recommend using automated tools only after you understand the fundamentals—this way, you can operate confidently, minimize risks, and truly grasp what each attack does.
Before diving into the attacks, I’ll walk you through configuring your antenna and introduce the key commands and functions. This setup will help you better understand each process, so don’t worry if it seems complex initially. At the end of the course, I’ve included a handy Cheat Sheet summarizing the most useful tools and commands to reinforce your learning.
One fascinating aspect of Wi-Fi auditing is that, even from outside a Wi-Fi network, you can often gather information, such as the number of connected clients and other network data. Throughout the course, I’ll guide you step-by-step on how to approach these tasks safely and effectively, ensuring you’re well-equipped for thorough network auditing.
Let’s start by checking if your antenna is properly recognized by the system and if the network interface has been created successfully. This is an essential step to ensure your setup is ready for Wi-Fi auditing.
To verify, execute the following command:
If your network interface is recognized, you should see an output similar to this:
The name of your interface may vary—it could appear as wlan1
, wlan2
, or something similar. If you see an interface listed, it means everything is functioning as expected.
To further explore your wireless interfaces, run the following command:
This command will display all available wireless interfaces, confirming that your antenna and system are set up correctly for the tasks ahead.
You should now see a list of interfaces, such as wlan0
. This display provides key details, including:
Managed
, Monitor
, Promiscuous
, or others.These details confirm that the interface is recognized and provide useful insights into its current operational state.
To begin auditing networks, you’ll need to set your antenna to monitor mode. This can be done in two primary ways—either with airmon-ng
(recommended) or iw
. Should you encounter any issues with commands during the course, check the Common Errors section, where I’ve provided solutions to some typical Wi-Fi-related problems.
To enable monitor mode, run:
Note: Replace wlan0 with the name of your specific interface if it differs.
After executing this command, list the interfaces again to confirm. You should see that the interface name has changed, often with “mon” added (e.g., wlan0mon
), and the mode has switched to monitor. This indicates that your setup is ready for network auditing.
iw
Another way to enable monitor mode is by using the iw
tool. While this method doesn’t append “mon” to the interface name, it still works just fine. Here’s how to do it:
In this method, the interface name won’t have "mon" appended to it, but it should still function properly. Just remember to replace wlan0 with your actual interface name if it differs. Once done, you're ready to start network auditing with the interface in monitor mode.
To return the interface to managed (normal) mode is very simple, just run one command (current version):
The command is airmon-ngresponsible for removing monitor mode and the command is ipresponsible for activating the interface once it has been reconfigured.
And when listing the virtual interfaces we see that everything is as it was at the beginning.
To do this task the other way, (with iw) run the following:
And your interface should return to managed mode without any problems.
It’s important to understand that during Wi-Fi attacks, your connection will be temporarily lost. This happens because two key services in the system, wpa_supplicant and NetworkManager, are responsible for maintaining the Wi-Fi connection.
When you attempt to inject packets into the air for an attack, some of those packets may be lost and fail to reach their destination. To avoid this, it's recommended to "kill" these services temporarily. Fortunately, airmon-ng
offers an option to stop these processes.
While it’s possible to perform attacks without killing these processes, doing so can lead to interference that might hinder the attack. The downside, however, is that you’ll lose your connection while performing the attack.
In short, it’s advisable to stop these services during attacks to ensure the smooth operation of your audit, but be aware that it will disconnect you from the network temporarily.
To kill conflicting processes
Note: This command will disconnect you from the network temporarily.
That should do the trick.
When you stop attacking and want to have wifi again you must run these two commands to restore the two services:
Note: These command will restore your network connection.
A handshake is an encrypted password that is transmitted in Wi-Fi packets whenever a client connects to an access point. For example, when you connect your mobile phone to your personal Wi-Fi network, a handshake is generated as part of the connection process.
Many attacks target this process by attempting to deauthenticate a device from the Wi-Fi network. The goal is to force the device to disconnect and then reconnect automatically. During this reconnection process, the attacker can capture the handshake.
Once the handshake is obtained, tools like Hashcat can be used to crack the password and gain access to the Wi-Fi network. Essentially, capturing the handshake is a crucial step in many Wi-Fi network attacks, enabling the attacker to attempt password recovery.
So far, the configuration and basic concepts part. You can also see more commands and content here and here
In this section we will see what the MAC address is, what it is used for, why to change it and what it has to do with wifi hacking.
Well, the truth is that they are simple questions. The MAC address is a unique identifier that each physical device has, such as your mobile phone or your television, and as I have already said, it allows devices to be identified, so when auditing Wi-Fi networks they can see your MAC address (identifier that sends the packets) and that is why it is good practice to change it with the tool macchanger(installed by default in Kali and Parrot).
Today we’re going to see how real malware protect themselves from being analyzed using a technique called Api Hashing. First of all we should...
Read MoreToday we’ll dump LSASS.EXE process memory to obtain credentials and we also will be using some evasion techniques. During red team...
Read MoreToday we’re gonna see an effective technique to mantain access in Windows systems during red team operations just by modifying a registry key...
Read MoreToday we’ll learn an advanced shellcode injection technique used by Lazarus group which uses UuidFromStringA API call. In this technique, the malware..
Read MoreInstahack is a security tool officially designed to test the password strength of Instagram accounts using termux and kali with a brute force attack...
Read MoreToday we’re gonna see a simple malware development technique, Shellcode injection via CreateRemoteThread in Golang...
Read More