Course Overview
TOPThis training addresses security concerns and teaches students how to best defend wireless systems against attacks.
Scheduled Classes
TOPWhat You'll Learn
TOPThe scope is divided into three parts:
- 802.11 wireless networks deployed within a home or enterprise setting
- 802.11 wireless networks with a client focus
- Hacking additional wireless technologies
The parts reveal how easily attackers can attain and use tools for targeting, infiltrating and hijacking vulnerable systems. The instructor explains how to apply comprehensive defense techniques to effectively protect all wireless devices and infrastructures.
Outline
TOPModule 1: 802.11 Hacking
- Lesson 1A: Basics of 802.11
- Lesson 1B: Hardware and Drivers
Module 2: Operating Systems and Tools for 802.11 Networks
- Lesson 2A: Choosing an OS based on Hardware and Applications
- Lesson 2B: inSIDer and Vistumbler Windows Network Scanners
- Lesson 2C: Sniffing and Injection Tools for Windows
- Lesson 2D: KisMAC Mac OS X Discovery Tool
- Lesson 2E: Kismet Linux Discovery Tool
- Lesson 2F: Mobile Discovery Tools and Online Mapping
Module 3: Tools and Techniques for Bypassing 802.11 Wireless Networks
- Lesson 3A: Basic Attack Types
- Lesson 3B: Accessing Hidden or Nonbroadcasting Wireless Networks
- Lesson 3C: Cracking WEP Keys
- Lesson 3D: Cracking Hidden and WEP-Encrypted Networks
- Lesson 3E: Recovering a Keystream
- Lesson 3F: Deauth Attacks and Michael Countermeasures
Module 4: Practical Attacks against WPA Networks
- Lesson 4A: Breaking WPA with Pre-Shared Key (PSK) Authentication
- Lesson 4B: Breaking WPA Enterprise Authentication
- Lesson 4C: Encryption Attacks against TKIP
- Lesson 4D: Attacking Components
Module 5: Compromising Wireless Clients
- Lesson 5A: Application Level Attacks
- Lesson 5B: Client Attacks with an Evil DNA Server
- Lesson 5C: ARP Spoofing with Ettercap
- Lesson 5D: Rogue Apps and Evil Servers with Karmetasploit
- Lesson 5E: Direct Client Injection
- Lesson 5F: Device Driver Vulnerabilities
- Lesson 5G: WI-FI and Web Hacking
Module 6: Exploiting a Mac OS X 802.11 Wireless Client
- Lesson 6A: Preparing and Testing the Exploit
- Lesson 6B: Preparing Tools for Installation
- Lesson 6C: Initial Reconnaissance Preparation
- Lesson 6D: Kismet, Aircrack-ng Preparation
- Lesson 6E: Preparing and Executing the Package
- Lesson 6F: Delivering the Java Exploit
- Lesson 6G: Using the User-Level Code Execution to the Highest Extent
Module 7: Exploiting a Windows Wireless Client
- Lesson 7A: Overview of a Windows Client Attack
- Lesson 7B: Establish the Attack Infrastructure
- Lesson 7C: Exploiting a Hotspot Environment
- Lesson 7D: Controlling the Client
- Lesson 7E: Wireless Reconnaissance Local and Remote
- Lesson 7F: Target Wireless Network Attack
Module 8: Bluetooth Scanning and Reconnaissance
- Lesson 8A: Overview of Bluetooth Device Interaction
- Lesson 8B: Attack Preparation
- Lesson 8C: Reconnaissance Phase of a Bluetooth Attack
- Lesson 8D: SDPtool for Enumerating Services
Module 9: Bluetooth Eavesdropping Attacks
- Lesson 9A: Using Commercial Bluetooth Sniffers
- Lesson 9B: Open-Source Bluetooth Tools
Module 10: Attacking and Exploiting Bluetooth
- Lesson 10A: PIN Attacks
- Lesson 10B: Practical PIN Cracking
- Lesson 10C: Manipulating Bluetooth Identification Mechanisms
- Lesson 10D: Vulnerabilities in Bluetooth Profiles
- Lesson 10E: Future of Bluetooth
Module 11: ZigBee Protocol
- Lesson 11A: Overview of ZigBee Technology
- Lesson 11B: ZigBee Security Measures
- Lesson 11C: ZigBee Attack and Exploitation
- Lesson 11D: Start to Finish Attack against ZigBee Device Implementation
Module 12: Hack DECT
- Lesson 12A: Overview of DECT Devices and Technology
- Lesson 12B: DECT Security Standards
- Lesson 12C: DECT Attacks and deDECTed.org
Module 13: Scoping and Information Gathering
- Lesson 13A: Pre-Assessment Planning Process
- Lesson 13B: Assessing Information and Estimating Effort
Prerequisites
TOPBefore attending this course, students should have:
- At least two years of work experience in professional networking
- CompTIA Network+, Security+ and EC-Council CEH certifications or hold equivalent experience and knowledge
Who Should Attend
TOPThis course is intended for:
- CIO Officers
- Forensics Investigators
- Malware Analysts