kinguin loginAtenção!Apartir de 1 de Janeiro de 2015 a União Europeia vai mudar a regulação das taxas.Por favor escolha taxa da região apropriada abaixo.

Comece a vender AGORA

Minha conta
arrow login
100% verified sellers
A money back guarantee
KBP dedicated deals
Priority with our Customer Service
Suporte
Perguntas Frequentes
Frequently Asked Questions
Create a Ticket
Resposta Rápida
Chat online
Compra

Complete Ethical Hacking Series: Wireless Hacking Ninja ShopHacker.com Code

Complete Ethical Hacking Series: Wireless Hacking Ninja ShopHacker.com Code
Software
Other
Other
N/A
Ganhe até US$0,00 com a Kinguin Mafia! Saiba Mais!
Este é um produto restrito e NÃO PODE ser ativado e/ou jogado na China.
  • Descrição
  • Requisitos de Sistema
  • Detalhes de ativaçao

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills to practical use immediately.

Wireless Hacking with Kismet - Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 Wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode and can sniff 802.11a, 802.11b, 802.11g and 802.11n traffic. The program runs under Linux and OSX.
Wi-Fi Pineapple - The WiFi Pineapple® NANO and TETRA are the 6th generation auditing platforms from Hak5. Thoughtfully developed for mobile and persistent deployments, they build on over 8 years of WiFi penetration testing expertise.

  • WiFi man-in-the-middle platform
  • Highly effective rogue AP suite
  • Over-the-air apps and modules
  • Advanced client and AP filtering
  • Intuitive web interface
  • Simplified auditing workflow
  • Live reconnaissance view
  • At-a-glance intelligence
  • Device tracking and alerting
  • Reports emailed at set intervals
  • Built on embedded Linux
  • Free software updates

Ubertooth - The Ubertooth One is an opensource Bluetooth test tool from Michael Ossmann. It is the world's first affordable Bluetooth monitoring and development platform and is a fully open source product (both hardware and software).
Bluetooth Low Energy Hacking - Bluetooth Low Energy (BLE), sometimes referred to as "Bluetooth Smart", is a light-weight subset of classic Bluetooth and was introduced as part of the Bluetooth 4.0 core specification. While there is some overlap with classic Bluetooth, BLE actually has a completely different lineage and was started by Nokia as an in-house project called 'Wibree' before being adopted by the Bluetooth SIG.
Hacking Wireless with Metasploit - The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS Signature development.
Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shell code archive, and related research. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.
Aircrack - Aircrack-ng is a complete suite of tools to assess WiFi network security.
It focuses on different areas of WiFi security:
Monitoring: Packet capture and export of data to text files for further processing by third-party tools.
Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
Testing: Checking WiFi cards and driver capabilities (capture and injection).
Cracking: WEP and WPA PSK (WPA 1 and 2).
Reaver - Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.
On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase
Who is the target audience?

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills to practical use immediately.

 

 

Minimum
  • Students should have a working understanding of TCP/IP and networking concepts.
  • What will you be able to do after taking this course?

Key ativação

You will be provided with the direct link to the ShopHacker.com website, where you will be asked to create an account. After that, you will be redirected to the page with further instructions on how to redeem your product.

Unable to activate even after following the steps above?

Report a problem!

Are the instructions not clear? Let us help you!

LiveChat

Enviar um Tocket

Live Chat
Se alterar o seu país de residência o preço de retalho vai incluir a taxa plicada nesse país, ou sem taxa se estiver fora da UE.
Eu eceito