Wireless Exploitation Course

$1,250.00

(1 customer review)

We carefully designed a training pipeline to bring you from zero knowledge in wireless technologies to understanding and mapping vulnerabilities to running exploits and attacks. Within our offerings, we sourced the best training to make you competitive in today’s market. Building around Offensive Security’s Wifu, we start you with a Linux primer, then bring you through the basics of 802.11 networking. This builds a solid knowledge base to dive confidently into intensive wireless exploitation.  At the end of the curriculum, you will be able to certify in both CWNA and OSWP (both tests and required hardware included in price). Even better, the course is at your pace. We estimate 3-6 weeks for completion.

Description

We carefully designed a training pipeline to bring you from zero knowledge in wireless technologies to understanding and mapping vulnerabilities to running exploits and attacks. Within our offerings, we sourced the best training to make you competitive in today’s market. Building around Offensive Security’s Wifu, we start you with a Linux primer, then bring you through the basics of 802.11 networking. This builds a solid knowledge base to dive confidently into intensive wireless exploitation.  At the end of the curriculum, you will be able to certify in both CWNA and OSWP (both tests and required hardware included in price). Even better, the course is at your pace. We estimate 3-6 weeks for completion.

The course consists of an introductory primer and the following modules.

  1. IEEE 802.11 ()
  2. Wireless Networks
  3. Packets & Network Interaction
  4. Getting Started (Hardware)
  5. Linux Wireless Stack & Drivers
  6. AirCrack-NG Essentials
  7. Cracking WEP with Connected Clients
  8. Cracking WEP Via a Client
  9. Cracking Clientless WEP Networks
  10. Bypassing WEP Shared Key Authentication
  11. Cracking WPA/ WPA2 PSK with AirCrack-NG
  12. Cracking WPA with JTR & AirCrack-NG
  13. Cracking WPA with coWPAtty
  14. Cracking WPA with Pirat
  15. Additional AirCrack-NG Tools
  16. Wireless Reconnaissance
  17. Rogue Access Points

Appendix contents

  1. Cracking WEP via a Client – Alternate Solutions
  2. Equipment Used

1 review for Wireless Exploitation Course

  1. Corina Baker

    Fantastic course! I have so much more confidence in my ability to test for venerabilities and actually apply this to my field. Thank you!

Add a review

Your email address will not be published. Required fields are marked *

Title