Wireless Exploitation Course

$1,250.00

We carefully designed a training pipeline to bring you from zero knowledge in wireless technologies to understanding and mapping vulnerabilities to running exploits and attacks. Within our offerings, we sourced the best training to make you competitive in today’s market. Building around Offensive Security’s Wifu, we start you with a Linux primer, then bring you through the basics of 802.11 networking. This builds a solid knowledge base to dive confidently into intensive wireless exploitation.  At the end of the curriculum, you will be able to certify in both CWNA and OSWP (both tests and required hardware included in price). Even better, the course is at your pace. We estimate 3-6 weeks for completion.

Description

We carefully designed a training pipeline to bring you from zero knowledge in wireless technologies to understanding and mapping vulnerabilities to running exploits and attacks. Within our offerings, we sourced the best training to make you competitive in today’s market. Building around Offensive Security’s Wifu, we start you with a Linux primer, then bring you through the basics of 802.11 networking. This builds a solid knowledge base to dive confidently into intensive wireless exploitation.  At the end of the curriculum, you will be able to certify in both CWNA and OSWP (both tests and required hardware included in price). Even better, the course is at your pace. We estimate 3-6 weeks for completion.

The course consists of an introductory primer and the following modules.

  1. IEEE 802.11 ()
  2. Wireless Networks
  3. Packets & Network Interaction
  4. Getting Started (Hardware)
  5. Linux Wireless Stack & Drivers
  6. AirCrack-NG Essentials
  7. Cracking WEP with Connected Clients
  8. Cracking WEP Via a Client
  9. Cracking Clientless WEP Networks
  10. Bypassing WEP Shared Key Authentication
  11. Cracking WPA/ WPA2 PSK with AirCrack-NG
  12. Cracking WPA with JTR & AirCrack-NG
  13. Cracking WPA with coWPAtty
  14. Cracking WPA with Pirat
  15. Additional AirCrack-NG Tools
  16. Wireless Reconnaissance
  17. Rogue Access Points

Appendix contents

  1. Cracking WEP via a Client – Alternate Solutions
  2. Equipment Used

Reviews

There are no reviews yet.

Be the first to review “Wireless Exploitation Course”

Your email address will not be published. Required fields are marked *