Understanding and Inspecting Wireless Networks
Wireless networks and Bluetooth technology have allowed some major vulnerabilities since their inception. Being able to scan for and connect to these devices is crucial to becoming a successful hacker.
Intro – 0:00
Welcome to Tech Tuesday and Thank You – 0:08
Wireless Terminology and Information – 00:45
Wireless Networking Commands – 05:20
iwlist – 06:50
using nmcli – 08:20
aircrack-ng suite – 10:15
reaver and wifite – 21:30
working with Bluetooth on kali – 24:05
Final thoughts – 27:05
Linux Basics for Hackers: https://nostarch.com/linuxbasicsforhackers
How to Support:
🍺Buy Me A Beer: https://www.buymeacoffee.com/CyberWarrior
⏩GoFundMe: https://www.gofundme.com/cyber-warrior-studios
⏩Patreon: https://www.patreon.com/CyberWarriorStudios
Merchandise:
⏩https://www.cyberwarriorstudios.com
Please subscribe, like, and comment! I want your input and ideas! Let me know what you’d like to see discussed next!
How to connect:
⏩Twitter: @CyberWarriorSt1
⏩ Instagram: @CyberWarriorStudios
⏩ Facebook: @CyberWarriorStudios
⏩Discord: https://discord.gg/yCNE3SehCW
⏩Reddit: https://www.reddit.com/r/CyberWarriorStudios
Eric Belardo Cyber: https://www.youtube.com/c/EricBelardoCyber
***Tech Tuesday***
#techtuesday
#linuxbasics
#kali
#CyberWarrior
#kalilinux
#redteam
#hacker
#hackers
#newbattlefields
#vmware
#vmwareworkstation
#cyberwarriorstudios
#cyberwarrior
#purpleteam
#offensivesecurity
#tor
#vpn
#proxies
#proxyserver
#nordvpn
#protonmail
#wireless
#bluetooth
#aircrack
#reaver
#wifite
#TheCyberWarrior
Rock Intro 4 by Audionautix is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
Artist: http://audionautix.com/ .
Comments are closed.