MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Hacking Wireless Networks. Theory and practice.

Course Summary

38% of secured Wi-Fi networks are vulnerable to the attack which can be carried out by a 12-year-old in 4 minutes! HOW?


  • +

    Course Syllabus

    • Download your Training Operating System v2.0 CE
      • Download the TOS v2.0 CE (CUDA Extension) ISO image
    • Download the whole course Handbook
      • Download the course Handbook in PDF
    • Course overview
      • Table of contents
      • Legal information
    • Introduction to wireless networks
      • Introduction
      • Wireless transmission standards
      • 802.11 wireless network types
      • Encryption and authentication standards
      • Wireless network cards in Linux - overview
      • Wireless network interface cards in Linux
    • Wireless security (half) measures: An overview
      • MAC address filtering
      • Changing the MAC address of the wireless network card
      • Disabling ESSID broadcast
      • Finding a hidden access point with disabled ESSID broadcast
      • Limiting wireless coverage
    • Wireless network attacks independent of used encryption
      • Introduction
      • DoS: RF jamming
      • DoS: CSMA/CA jamming
      • The use of deauthentication attack for jamming network traffic
      • DoS: Deauthentication attack
      • Wireless MITM
    • WEP attacks
      • Section outline
      • WEP encryption
      • Chopchop
      • The overview and demonstration of the chop-chop attack
      • Keystream reuse
      • Generating packets without knowing the network key
      • Interactive packet replay and ARP request replay
      • The demonstration of the PTW and KoreK attacks
      • Caffe Latte Attack
      • Creating a fake access point – the Caffe Latte attack
    • WPA attacks
      • Introduction
      • WPA
      • The dictionary attack on WPA
      • WPA2
      • Rainbow tables
      • The dictionary attack on WPA – using hash tables
      • Cowpatty attack
      • DoS: Taking advantage of the MIC failure holdoff time
    • CUDA-powered attacks
      • What is CUDA?
      • CUDA – the initial preparation of the environment
      • The installation of CUDA-SDK and CUDA-Toolkit
      • The compilation and installation of the tools with CUDA support
      • The optimization of the parameters of an nVidia video card
      • CUDA – preparation for the attack
      • CUDA – the attack on WPA
      • Generating your own dictionary
      • Applications for cracking MD4 and MD5 hashes with the use of CUDA technology
      • Wardriving experiment
    • Advanced attacks against WPA
      • WKA TKIP attack
      • WPA TKIP broken
      • Beck-Tews attack enhanced
      • Michael Reset attack
      • Summary
    • Summary
      • Summary
    • References
      • References
    • Free additions
      • IT SEC Beginner: Certified Hacking Training: Monitoring - What you will learn
      • IT SEC Beginner: Certified Hacking Training: Monitoring Transmitted Data
      • IT SEC Beginner: Certified Hacking Training: WiFi Security - What you will learn
      • IT SEC Beginner: Certified Hacking Training: WiFi Security - Overview and sol...
      • IT SEC Beginner: Certified Hacking Training: WiFi Security - Threats
      • Website Hacking in Practice Course: Module 13. SQL injection - Video Training


Course Fee:
USD 99

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top