Introduction to Wireless Hacking

FacebookTwitterGoogle+LinkedInEmail
Description
[toggle_content title="Transcript"] Hi Leo Dregier here. This is one of my favorite modules, wireless penetration testing. There is so much to do wirelessly these days - the applications in which we penetrate, penetration test systems. They have come leaps and bounds over the last ten years. It all starts with encrypting our networks. So there is multiple types of encryption. We are going to take apart web and wpa and wpa2 and all that fun stuff and we are going to look at the different types of attacks whether it be attacks on integrity and attacks on confidentiality. Unavailability like websites and things like that knocking access points offline. The whole world driving concepts whether you are driving a car or flying a plane or using a drone nowadays. We will look at the full wireless spectrum. How we can use that to our advantage and you are going to spend a lot of time on the most popular tools out there. So literally the latest and greatest stuff but before we can get to the advanced stuff we got to start one foot in front of the other and we are going to start from the beginning and go all the way to the end. We will cover a little bit on Bluetooth only because that is considered wireless. But that is realistically its own module and then lastly we will wrap up with how to defend against people poking and prodding your wireless networks. So let us go ahead and get started. [/toggle_content] This next module in the Penetration Testing and Ethical Hacking series introduces you to the Wireless environment and its unique challenges regarding intrusion vulnerabilities. Penetrating wireless systems first involves encryption.  The Wireless module peels back the layers of encryption, discusses the different wireless protocols, and the various types of wireless attacks including integrity, confidentiality, and rough websites that drive the access point off line.  You’ll spend a lot of time learning the latest and greatest tools currently available to use, and you’ll cover all the key wireless mediums from cells, to air travel to automobiles, and Bluetooth. The Wireless module examines beginning to current day wireless networking and the required penetration knowledge, plus pen testing techniques that will help you defend those environments as an ethical hacker. The topics explored in the Wireless module include:
  • Whiteboard, which shows the interrelationship of all the basic components utilized in this module
  • And the following simulation labs:
    • airoDump Lab
    • airoMon Lab
    • Kismet Lab
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel