WEBVTT

00:00:01.640 --> 00:00:03.220
Awesome! I hope you enjoyed the demos.

00:00:03.230 --> 00:00:04.390
But before we go,

00:00:04.400 --> 00:00:06.640
let me give you some more information in case you want to learn

00:00:06.640 --> 00:00:09.610
more about wireless security assessments. First,

00:00:09.620 --> 00:00:13.120
as I mentioned at the beginning of the course, aircrack‑ng is a framework

00:00:13.120 --> 00:00:16.050
that has tons of other features such as package replays,

00:00:16.250 --> 00:00:20.420
fake access points, and much more, If you're interested to learn all the

00:00:20.430 --> 00:00:24.670
aircrack capabilities, access the official aircrack‑ng.org website.

00:00:25.140 --> 00:00:28.350
It has tons of good documentation on all the tools in the framework.

00:00:29.440 --> 00:00:32.330
Also, if you're interested in cracking WPA2 networks,

00:00:32.470 --> 00:00:36.480
I do recommend you preparing some good WPA2 password lists. In this

00:00:36.480 --> 00:00:39.460
link you are seeing here, you'll find several password word lists that

00:00:39.460 --> 00:00:41.670
can be used to brute force WPA2 passwords.

00:00:42.940 --> 00:00:43.510
Also,

00:00:43.520 --> 00:00:45.720
if you're interested in learning more about wireless penetration

00:00:45.720 --> 00:00:48.460
testing, there are few courses here at Pluralsight that are

00:00:48.460 --> 00:00:50.050
focused on wireless penetration testing.

00:00:50.940 --> 00:00:54.740
Personally, I do recommend you watching the Wireless Penetration Testing course,

00:00:54.790 --> 00:00:57.430
which covers the aircrack tool and some other really

00:00:57.430 --> 00:00:59.070
interesting Wi‑Fi pen testing tools.

00:00:59.840 --> 00:01:02.470
The interesting part of this course is that you'll learn not only how

00:01:02.470 --> 00:01:06.110
to perform the attacks, but also how the attack works and the theory

00:01:06.110 --> 00:01:10.230
behind it. And similar to that course, we have the advanced techniques

00:01:10.230 --> 00:01:13.960
for wireless penetration testing, which is a continuation of the previous course.

00:01:14.440 --> 00:01:17.220
In there, you'll learn things such as rogue access points,

00:01:17.400 --> 00:01:19.570
fake captive portals, and much more.

00:01:21.040 --> 00:01:21.820
So that's it.

00:01:21.830 --> 00:01:24.740
I hope you enjoyed this course, and I hope you have one more useful

00:01:24.740 --> 00:01:28.280
tool in your red team toolbox. Make sure you practice what you

00:01:28.280 --> 00:01:31.490
learned here at home so then in a read team assessment you'll be

00:01:31.490 --> 00:01:33.070
ready to crack some Wi‑Fi networks.

00:01:33.440 --> 00:01:35.750
So, thank you for watching, and I'll see you soon.
