(Created page with "=Wireshark - Packet Class by Didier Stevens = ===Course Description=== This training is based on the best selling book “Backtrack 5 Wireless Penetration Testing" and will p...") |
|||
Line 1: | Line 1: | ||
− | = | + | =Advanced Wi-Fi Pentesting by Vivek Ramachandran = |
===Course Description=== | ===Course Description=== | ||
Line 15: | Line 15: | ||
* Breaking into the Client - Metasploit, SET, Social Engineering | * Breaking into the Client - Metasploit, SET, Social Engineering | ||
* Enterprise Wi-Fi Worms, Backdoors and Botnets | * Enterprise Wi-Fi Worms, Backdoors and Botnets | ||
− | |||
− | |||
− | |||
=Objectives= | =Objectives= | ||
− | |||
− | |||
− | |||
− | |||
=Course Contents= | =Course Contents= | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
=Prerequisites= | =Prerequisites= | ||
− | + | Technical requirements for the training : | |
− | + | * Laptop with at least 3 GB RAM | |
− | + | * Kali Linux installed in Virtualbox with Windows / Linux / Mac as the Host | |
− | + | * 1 working USB 2.0 port on your laptop (important as the Wi-Fi card only works with 2.0 ports) | |
− | + | * Admin / Root on the laptop so you can install software | |
− | |||
=Trainer Biography= | =Trainer Biography= | ||
− | |||
− | |||
− | |||
− | |||
− | More information is available on | + | More information is available on |
− | <br>[[Image:300px-twitter-icon.jpg|17px]] [ | + | <br>[[Image:300px-twitter-icon.jpg|17px]] [] |
''Mon. 22 - Tue. 23 September 2014 (09:00 - 17:00)'' | ''Mon. 22 - Tue. 23 September 2014 (09:00 - 17:00)'' |
Revision as of 20:54, 12 May 2014
Contents
Advanced Wi-Fi Pentesting by Vivek Ramachandran
Course Description
This training is based on the best selling book “Backtrack 5 Wireless Penetration Testing" and will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide participants with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools.
During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out against live CTF challenges. These include - cracking WPA Enterprise (PEAP, EAP-TTLS), MITM attacks over Wireless, Creating Wi-Fi Backdoors, Scripting and Attack automation, Wireless Forensics and Security Best Practices.
A non-exhaustive list of topics to be taught includes:
- Bypassing WLAN Authentication - Shared Key, MAC Filtering, Hidden SSIDs
- Cracking WLAN Encryption - WEP, WPA/WPA2 Personal and Enterprise, Understanding encryption based flaws (WEP,TKIP,CCMP)
- Attacking the WLAN Infrastructure - Rogues Devices, Evil Twins, DoS Attacks, MITM, Wi-Fi Protected Setup
- Advanced Enterprise Attacks - 802.1x, EAP, LEAP, PEAP, EAP-TTLS
- Attacking the Wireless Client - Honeypots and Hotspot attacks, Caffe-Latte, Hirte, Ad-Hoc Networks and Viral SSIDs, WiFishing
- Breaking into the Client - Metasploit, SET, Social Engineering
- Enterprise Wi-Fi Worms, Backdoors and Botnets
Objectives
Course Contents
Prerequisites
Technical requirements for the training :
- Laptop with at least 3 GB RAM
- Kali Linux installed in Virtualbox with Windows / Linux / Mac as the Host
- 1 working USB 2.0 port on your laptop (important as the Wi-Fi card only works with 2.0 ports)
- Admin / Root on the laptop so you can install software
Trainer Biography
More information is available on
[]
Mon. 22 - Tue. 23 September 2014 (09:00 - 17:00)