Udemy Learn Hacking using Raspberry Pi From Scratch Udemy
Price: USD 200
  • Duration: Flexible

Course details

This course, you are going to start as a beginner without any previous knowledge about the hacking, this time we will use the Raspberry Pi instead of our PC/Laptop for hacking, we will start from setting up the Raspberry Pi ending with using it carry our variousattacks like Wi-Fi, Windows, Linux, Mac OS hacking.

Thiscourse is intended forbeginners and professionals,if you are abeginneryouwill start from zero until you become an expert level,and if you are a professional so this course will increase your knowledge about the hacking.

In this course, you'll learn how the Black Hat Hackers use the Raspberry Pi to implement remotely advanced hacking techniques to Crack WEP/WPA2 Wi-Fi encryption key and to Compromise Windows, Linux and Mac OSX operating systems by setting up the Raspberry Pi 3 as a server and Raspberry Pi zero as the hacking hardware.

Thecourse is divided to eleven sections:

Configure Raspberry Pi:In this section, you'll learn what Raspberry Pi is and what it is used for,and also the section focuses onconfiguringtheRaspberry Pi to run Kali Linux properly,and also itdiscoverssolving for theissues that you may face during setting up the Raspberry Pi ,you'll also learnhow tosetupanLCD display to your Raspberry Pi 3.

Connecting to Raspberry Pi:After learning how to configure anddealwith the Raspberry Pi 3,in this section you'll learn multiple ways to connect to your Raspberry Pi using your PC/Laptop, Android and iPhone smartphones wirelessly or using USB cable to connect to Raspberry Pi GUI (Graphical User Interface)via VNC server and to its CLI (Command Line Interface) via SSH.

Network Basics:This sectionexplains the basic conceptsof the networks that you have tounderstand before you get into Wi-Fi hacking it will elaborate you the difference between Managed &Monitor modesinWi-Fi cards and also it will explain what the Mac Address is and how to spoof it.

Pre-Connection Attacks:This sectionteachesyou the attacks that you can carry out against anyWi-Fi access point without having to be associated with it, these attacks are very important to understand and learnbecause it's the key of the next Wi-Fi cracking section.

Cracking WEP Wi-Fi Key using Raspberry Pi:This sectionfocuses on explaining what WEPencryption is anddifferentmethodstypes to crack WEPWi-Fi key, this section focuses on the practical side without neglecting the theory behind each attack.

Hacking Wi-Fi Access point by Cracking the Password:This is the first section of Hacking WPA/WPA2 Key series where it is going to focus on cracking WPA2 Wi-Fi key using dictionary attack, it will show you how to implement the attack using your Raspberry Pi, your computer CPU and also cracking the key much faster using your computer GPU.

Hacking any Wi-Fi access point using Raspberry Pi (Without Wordlist):This section shows you the last option or the last attack that you can use to steal WPA2 Wi-Fi key without using a wordlist, this done by using Evil Twin attack that will jam and clonethe target access point and broadcast it to force the target to connect to it and type the key.

Setup Raspberry Pi 3 to Hack Windows, Linux, Mac OSX: This section discovers setting up theRaspberry Pi 3 to work as a server to listen forareverseconnection from the target OS andit alsoexplains how to create a stager or payloadfor Windows, Linux andMac OSX that will give usaccess to the target OS and lastlyit shows you how to get a reverse connection over WAN.

Hacking Windows/Linux just by plugging Raspberry Pi Zero:This sectionwilltake you step further by teaching you how to use Raspberry Pi Zero wto gain access to any Windows or Linux operating system just by plugging it to the targeted computer and italsoexplainsstealing and cracklocked Windows login credentials just by plugging it to the target computer.

Post Exploitation(Windows, Linux):After learning how to gain access to any Windows and LinuxOS, this section will continue with you by explaining theattacks that can be launchedon the target machine likemaintaining your accessfor later use orescalatingyour privilegesto an administrator or root,or to run some modules that will give you more sensitiveinformation about the compromised machine.

Bonus Section: This section contains all the extra lectures that i'll added to this course and 95%discounts on all my Ethical Hacking Courses to improve your hacking skills.

The RecommendedWi-Fi Chipsets:

  • RTL8812AU (supports 5/2.4Ghz)
  • Atheros AR9271(supports2.4Ghz)


Notice:This course is only for the educationalpurposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices.

  • theseAttacks workagainstany Windows OSwhetheritsWindows 10/8.1/8/7/Vistaetc....
  • You must practice what you'velearned to become an advanced level,because this coursefocuses on bothpractical and theoreticalside.
  • This course is going to be always up to date.
  • If you have any question or any problem send me a message and Ill beglad to response.
  • After finishing this course, you will get a certificate directly from Udemy.
  • All the people who enrolled in this course will get discounts for future courses.
  • Allthe Rights are Reserved to Saad Sarrajno other Organizationisinvolved.
Updated on 14 November, 2018
Courses you can instantly connect with... Do an online course on Raspberry Pi starting now. See all courses

Rate this page