TorBT - Torrents and Magnet Links Search Engine
[GigaCourse.com] Udemy - Learn Wi-Fi Password Penetration Testing (WEP WPA WPA2)
- Date: 2026-05-06
- Size: 2.0 GB
- Files: 113
File Name
Size
1. Chapter 1/1. Introduction.mp4
5.5 MB
1. Chapter 1/1. Introduction.vtt
4.0 kB
1. Chapter 1/1.1 01 Intro.pdf
108 kB
10. Bonus Section/1. Bonus Lecture - What's Next.html
6.0 kB
2. Preparation/1. Lab Overview & Needed Software.mp4
106 MB
2. Preparation/1. Lab Overview & Needed Software.vtt
8.5 kB
2. Preparation/1.1 Virtual Box Download Page.html
116 B
2. Preparation/2. Installing Kali Linux 2019 As a Virtual Machine.mp4
155 MB
2. Preparation/2. Installing Kali Linux 2019 As a Virtual Machine.vtt
11 kB
2. Preparation/2.1 How To Fix No Nat Network Issue.html
89 B
2. Preparation/2.1 Installing Kali Using ISO (use this method to install it as a MAIN machine)..html
104 B
2. Preparation/2.2 Installing Kali Using ISO (use this method to install it as a MAIN machine)..html
104 B
2. Preparation/2.2 Kali Linux Ready Images Download Page.html
140 B
2. Preparation/2.3 How To Fix Blank Screen When Starting Kali.html
158 B
2. Preparation/2.3 Kali Linux Ready Images Download Page.html
140 B
2. Preparation/2.4 How To Fix Blank Screen When Starting Kali.html
158 B
2. Preparation/2.4 How To Fix No Nat Network Issue.html
89 B
2. Preparation/3. Basic Overview Of Kali Linux.mp4
107 MB
2. Preparation/3. Basic Overview Of Kali Linux.vtt
5.8 kB
2. Preparation/4. Linux Terminal & Basic Commands.mp4
224 MB
2. Preparation/4. Linux Terminal & Basic Commands.vtt
12 kB
2. Preparation/4.1 List of Linux Commands.html
122 B
3. Network Basics/1. Networks Basics.mp4
67 MB
3. Network Basics/1. Networks Basics.vtt
4.3 kB
3. Network Basics/10. Connecting To Hidden Networks.mp4
13 MB
3. Network Basics/10. Connecting To Hidden Networks.vtt
5.9 kB
3. Network Basics/11. Bypassing Mac Filtering (Blacklists & Whitelists).mp4
21 MB
3. Network Basics/11. Bypassing Mac Filtering (Blacklists & Whitelists).vtt
11 kB
3. Network Basics/2. Connecting a Wireless Adapter To Kali.mp4
71 MB
3. Network Basics/2. Connecting a Wireless Adapter To Kali.vtt
5.9 kB
3. Network Basics/2.1 Virtual Box Extension Pack Download Page.html
97 B
3. Network Basics/2.1 Website That Sells Supported Wireless Adapters.html
88 B
3. Network Basics/2.2 Virtual Box Extension Pack Download Page.html
97 B
3. Network Basics/2.2 Website That Sells Supported Wireless Adapters.html
88 B
3. Network Basics/3. What is MAC Address & How To Change It.mp4
97 MB
3. Network Basics/3. What is MAC Address & How To Change It.vtt
8.3 kB
3. Network Basics/4. Wireless Modes - Managed & Monitor Mode Explained.mp4
50 MB
3. Network Basics/4. Wireless Modes - Managed & Monitor Mode Explained.vtt
7.0 kB
3. Network Basics/4.1 Alternative Method to Enable Monitor Mode.html
121 B
3. Network Basics/4.2 Best Wireless Adapters For Hacking.html
104 B
3. Network Basics/5. Sniffing Basics - Using Airodump-ng.mp4
41 MB
3. Network Basics/5. Sniffing Basics - Using Airodump-ng.vtt
6.8 kB
3. Network Basics/6. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.mp4
50 MB
3. Network Basics/6. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.vtt
8.7 kB
3. Network Basics/7. Targeted Sniffing Using Airodump-ng.mp4
55 MB
3. Network Basics/7. Targeted Sniffing Using Airodump-ng.vtt
11 kB
3. Network Basics/8. Deauthentication Attack (Disconnecting Any Device From The Network).mp4
63 MB
3. Network Basics/8. Deauthentication Attack (Disconnecting Any Device From The Network).vtt
7.1 kB
3. Network Basics/9. Discovering Hidden Networks.mp4
16 MB
3. Network Basics/9. Discovering Hidden Networks.vtt
10 kB
4. WEP Cracking/1. Cracking Sections Introduction.mp4
25 MB
4. WEP Cracking/1. Cracking Sections Introduction.vtt
1.3 kB
4. WEP Cracking/2. Theory Behind Cracking WEP.mp4
87 MB
4. WEP Cracking/2. Theory Behind Cracking WEP.vtt
6.1 kB
4. WEP Cracking/2.1 03 WEP Cracking.pdf
117 kB
4. WEP Cracking/3. WEP Cracking - Basic Case.mp4
47 MB
4. WEP Cracking/3. WEP Cracking - Basic Case.vtt
6.7 kB
4. WEP Cracking/4. Associating With Target Network Using Fake Authentication Attack.mp4
55 MB
4. WEP Cracking/4. Associating With Target Network Using Fake Authentication Attack.vtt
7.2 kB
4. WEP Cracking/5. ARP Request Reply Attack.mp4
60 MB
4. WEP Cracking/5. ARP Request Reply Attack.vtt
6.4 kB
4. WEP Cracking/6. Chopchop Attack.mp4
17 MB
4. WEP Cracking/6. Chopchop Attack.vtt
7.4 kB
4. WEP Cracking/7. Fragmentation Attack.mp4
16 MB
4. WEP Cracking/7. Fragmentation Attack.vtt
6.8 kB
4. WEP Cracking/8. Cracking SKA Networks.mp4
18 MB
4. WEP Cracking/8. Cracking SKA Networks.vtt
10 kB
5. WPAWPA2 Cracking/1. WPA Cracking - Introduction.mp4
54 MB
5. WPAWPA2 Cracking/1. WPA Cracking - Introduction.vtt
3.7 kB
6. WPAWPA2 Cracking - Exploiting WPS/1. WPA Cracking - Exploiting WPS Feature.mp4
61 MB
6. WPAWPA2 Cracking - Exploiting WPS/1. WPA Cracking - Exploiting WPS Feature.vtt
12 kB
6. WPAWPA2 Cracking - Exploiting WPS/1.1 Reaver Download Link.html
92 B
6. WPAWPA2 Cracking - Exploiting WPS/2. Bypassing Failed to associate Issue.mp4
11 MB
6. WPAWPA2 Cracking - Exploiting WPS/2. Bypassing Failed to associate Issue.vtt
8.2 kB
6. WPAWPA2 Cracking - Exploiting WPS/3. Bypassing 0x3 & 0x4 Errors.mp4
19 MB
6. WPAWPA2 Cracking - Exploiting WPS/3. Bypassing 0x3 & 0x4 Errors.vtt
8.7 kB
6. WPAWPA2 Cracking - Exploiting WPS/4. WPS Lock - What Is It & How To Bypass it.mp4
18 MB
6. WPAWPA2 Cracking - Exploiting WPS/4. WPS Lock - What Is It & How To Bypass it.vtt
8.4 kB
6. WPAWPA2 Cracking - Exploiting WPS/5. Unlocking WPS.mp4
20 MB
6. WPAWPA2 Cracking - Exploiting WPS/5. Unlocking WPS.vtt
10 kB
7. WPAWPA2 Cracking - Wordlist Attacks/1. How To Capture The Handshake.mp4
46 MB
7. WPAWPA2 Cracking - Wordlist Attacks/1. How To Capture The Handshake.vtt
7.5 kB
7. WPAWPA2 Cracking - Wordlist Attacks/2. Creating a Wordlist.mp4
76 MB
7. WPAWPA2 Cracking - Wordlist Attacks/2. Creating a Wordlist.vtt
8.4 kB
7. WPAWPA2 Cracking - Wordlist Attacks/2.1 Some-Links-To-Wordlists (1).txt.txt
431 B
7. WPAWPA2 Cracking - Wordlist Attacks/3. Cracking Key Using A Wordlist Attack.mp4
59 MB
7. WPAWPA2 Cracking - Wordlist Attacks/3. Cracking Key Using A Wordlist Attack.vtt
6.8 kB
7. WPAWPA2 Cracking - Wordlist Attacks/4. Saving Cracking Progress.mp4
21 MB
7. WPAWPA2 Cracking - Wordlist Attacks/4. Saving Cracking Progress.vtt
10 kB
7. WPAWPA2 Cracking - Wordlist Attacks/5. Using Huge Wordlists With Aircrack-ng Without Wasting Storage.mp4
14 MB
7. WPAWPA2 Cracking - Wordlist Attacks/5. Using Huge Wordlists With Aircrack-ng Without Wasting Storage.vtt
8.3 kB
7. WPAWPA2 Cracking - Wordlist Attacks/6. Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage.mp4
25 MB
7. WPAWPA2 Cracking - Wordlist Attacks/6. Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage.vtt
11 kB
7. WPAWPA2 Cracking - Wordlist Attacks/7. Speeding the Cracking Process Using Rainbow Tables.mp4
9.9 MB
7. WPAWPA2 Cracking - Wordlist Attacks/7. Speeding the Cracking Process Using Rainbow Tables.vtt
7.4 kB
7. WPAWPA2 Cracking - Wordlist Attacks/8. Cracking WPAWPA2 Much Faster Using GPU - Part 1.mp4
16 MB
7. WPAWPA2 Cracking - Wordlist Attacks/8. Cracking WPAWPA2 Much Faster Using GPU - Part 1.vtt
8.1 kB
7. WPAWPA2 Cracking - Wordlist Attacks/9. Cracking WPAWPA2 Much Faster Using GPU - Part 2.mp4
34 MB
7. WPAWPA2 Cracking - Wordlist Attacks/9. Cracking WPAWPA2 Much Faster Using GPU - Part 2.vtt
11 kB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/1. What is WPAWPA2 Enterprise & How it Works.mp4
14 MB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/1. What is WPAWPA2 Enterprise & How it Works.vtt
6.2 kB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/2. How To Hack WPAWPA2 Enterprise.mp4
14 MB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/2. How To Hack WPAWPA2 Enterprise.vtt
7.8 kB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/3. Stealing Login Credentials.mp4
12 MB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/3. Stealing Login Credentials.vtt
9.0 kB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/4. Cracking Login Credentials.mp4
12 MB
8. WPAWPA2 Cracking - WPAWPA2 Enterprise/4. Cracking Login Credentials.vtt
7.1 kB
9. Protection/1. Securing Systems From The Above Attacks.mp4
26 MB
9. Protection/1. Securing Systems From The Above Attacks.vtt
5.8 kB
9. Protection/2. How to Configure Wireless Security Settings To Secure Your Network.mp4
11 MB
9. Protection/2. How to Configure Wireless Security Settings To Secure Your Network.vtt
7.6 kB
Readme.txt
962 B
[GigaCourse.com].url
49 B