BackTrack 5 Wireless Penetration Testing
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
154 students enrolled
Wishlisted Wishlist

Please confirm that you want to add BackTrack 5 Wireless Penetration Testing to your Wishlist.

Add to Wishlist

BackTrack 5 Wireless Penetration Testing

Watch and learn about wireless penetration testing using the latest version of the BackTrack penetrating testing suite
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
154 students enrolled
Last updated 6/2015
English
Current price: $10 Original price: $85 Discount: 88% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Crack WEP, WPA, WPA2, WPS, EAP/Radius based wireless networks
Creating a practice lab for wireless penetrating testing purposes
Sniff out and analyze wireless packets from the air
Penetrate wireless networks based on the enterprise versions of WPA and WPA2
Attack the WLAN infrastructure itself using DoS attacks, Fake APs, and other techniques
View Curriculum
Requirements
  • The course assumes that you already know the basics of wireless networks and can operate at least one Linux distribution.
  • Designed as a practical video tutorial with step-by-step instructions to teach you about Wireless Penetration Testing, the course has been designed to ensure that topics are presented in a gradual manner, allowing you to grasp the information that's being presented before moving on to more advanced topics.
Description

Armed with the essentials, you will learn how to conduct a host of cutting edge wireless attacks. You will learn how to execute attacks such as WLAN packet sniffing, revealing hidden SSIDs, open authentication by defeating MAC address filters, bypassing shared authentication, cracking WEP and WPA/WPA2 encryption.

In addition to documenting the essentials of wireless penetration testing, we will also discuss setting up rogue APs and wireless evil twins, client-based WEP cracking attacks, wireless infrastructure-based attacks, WPS PIN brute force attacks, denial of service (DoS) attacks, eavesdropping and session hijacking, EAP-based enterprise wireless hacking; and much more. Coverage also includes various countermeasures to protect wireless networks against these types of attacks, in order to help bolster the wireless security of any given network.

About the Author

Farrukh Haroon Farhat is an information security professional with over 8 years of experience. He currently works as a Security Analyst in IBM’s Global Technology Services (GTS) division. As a member of the Managed Security Services (MSS) operations team, Farrukh works with multi-vendor network security technologies, helping customers improve their security posture. He's previously worked as the IT Security Manager for an emerging telecom operator based in the Middle East. He has also delivered various professional trainings related to Information Security and Networking. Farrukh hold’s various industry certifications such as CISSP, CISA, CCIE Security (#20184), JNCIE-Security (#91) et al. He actively contributes to various online communities related to network security like Cisco Netpro. As a result of his contribution to Cisco’s official support community, he was awarded the ‘Cisco Designated VIP (Security)’ accreditation in 2011.

Who is the target audience?
  • This course is aimed at security professionals and IT professionals who want to learn about wireless penetration testing using the BackTrack Linux security distribution.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 35 Lectures Collapse All 35 Lectures 03:16:03
+
Introduction
1 Lecture 02:32

This video will provide a brief overview of what we'll cover throughout the course.

Introduction
02:32
+
Getting Started
3 Lectures 13:02

This video will help decide or choose which wireless hardware and software will best suit your needs.

Requirements for Setting Up Your Wireless Lab
07:53

This video will help to download and set up BackTrack 5 R2 for use in wireless penetration tests.

Setting Up BackTrack (Download and Installation)
03:27

This video will help to set up Wi-Fi access points in three easy steps.

Setting Up Your Wireless Access Points (APs) and Clients
01:42
+
Wireless Networks – Rewards and Risks
4 Lectures 35:09

This video will revisit the theory of wireless networks.

WLAN Theory Essentials
10:36

This video will discuss the wireless packet structure and the various fields contained in it.

An Introduction to Wireless Frames
13:35

This video will discuss the various tools available within the aircrack-ng wireless penetration and attack suite.

An Introduction to aircrack-ng
04:57

Eavesdropping on and interpreting wireless frames using various tools, such as Wireshark, tshark, tcpdump, and airodump-ng.

Capturing and Deciphering Wireless Frames
06:01
+
WLAN Authentication – Getting Past Invisible Barriers
4 Lectures 26:25

This video will describe the theory of authentication in general, and wireless authentication protocols.

An Introduction to Wireless Authentication Protocols
09:18

This video will demonstrate how to bypass hidden/invisible Wireless Service Set Identifies (SSIDs) using the wireshark and airodump-ng tools.

Revealing Hidden SSIDs
05:44

This video will demonstrate how easy it is to bypass MAC filters frequently employed by network administrators to secure Wi-Fi networks (by utilizing MAC spoofing).

Preview 04:56

This video will demonstrate how to bypass Shared Key Authentication even tough it uses an encrypted challenge handshake process.

Bypassing Shared Key Authentication (SKA)
06:27
+
Exploiting WLAN Encryption Flaws
4 Lectures 28:56

This video will describe the theory of encryption in general, and wireless encryption protocols.

An Introduction to Wireless Encryption Protocols
09:03

This video will list three easy steps to find out the WEP encryption key.

Cracking WEP Encryption
06:59

This video will help understand the steps required to penetrate WPA or WPA2 PSK based wireless networks.

Cracking WPA/WPA2 Pre-shared Keys
07:37

This video will demonstrate how we can capitalize on the cracked WEP or WPA keys or pass-phrases by authenticating and associating with the compromised network.

Connecting to Compromised Networks
05:17
+
WLAN Infrastructure – Threats and Countermeasures
4 Lectures 19:55

This video will demonstrate how we can penetrate wireless networks using the default usernames and passwords that are bundled with various Wi-Fi devices such as access points.

Preview 04:07

Simulate a Denial-of-service (DoS) attack that is meant to shut down a machine or network.

Preview 05:34

This video will demonstrate how to exploit implementation weaknesses in the Wi-Fi Protected Access (WPS) feature, to gain access to the various security settings of vulnerable access points.

Preview 04:53

This video will demonstrate how to create software-based fake access points using the airbase-ng utility.

Preview 05:21
+
Advanced Client-based WiFi Attacks
5 Lectures 20:10

This video will help to understand how we can penetrate wireless networks using wireless end-stations only, without the need of other wireless network elements such as access points.

An Introduction to Client-based Attacks
10:03

This video will demonstrate how to create software-based fake access points using the airbase-ng utility, based on the probe request packets sent by wireless clients.

Attacking Clients using Honeypots
02:05

This video will demonstrate how to utilize the message injection and bit-flipping techniques to crack WEP keys based on isolated wireless clients.

Hands-on Demonstration: Caffé Latte Attack
02:11

This video will show how to combine the Caffe Latte attack and fragmentation techniques to crack WEP keys, once again based on isolated wireless clients.

Hands-on Demonstration: Hirte Attack
01:50

This video will demonstrate how to execute WPA or WPA2 pre-shared key (PSK) cracking attacks based on wireless clients.

Cracking WPA without an AP
04:01
+
WLAN Security – Taking It One Step Further
4 Lectures 21:31

This video will describe the theoretical details pertaining to MITM-based wireless attacks such as eavesdropping and session hijacking.

An Introduction to Man-in-the-middle (MITM) Attacks
05:39

This video will demonstrate the essential configuration steps to set up our wireless network for man-in-the-middle attacks.

Essential Steps: Wireless MITM Attacks
06:21

This video will demonstrate how to carry out eavesdropping and session hijacking attacks based on your MITM setup.

Eavesdropping and Session Hijacking
04:46

This video will demonstrate how to enumerate the wireless security profiles currently cached on wireless clients.

Detecting Client Security Settings
04:45
+
Enterprise Wireless Hacking
4 Lectures 18:43

This video will demonstrate how to set up the FreeRADIUS daemon and the associated Wireless Pwnage Edition (WPE) patch for WPA enterprise cracking.

Setting up FreeRADIUS-WPE
05:40

Cracking PEAP due to improper configurations, such as a lack of certificate validation on the supplicant side.

Hands-on Demonstration: Cracking PEAP
04:31

Cracking EAP-TTLS due to improper configurations, such as a lack of certificate validation on the supplicant side.

Hands-on Demonstration: Cracking EAP-TTLS
03:33

This video will discuss the various best practices related to WPA- or WPA2-based enterprise WLANs.

Security Best Practices for Enterprise WLANs
04:59
+
WLAN Penetration Testing – Doing it Effectively!
2 Lectures 09:40

This video will discuss the four different phases or steps of the wireless penetration testing process.

WLAN Penetration Testing: Doing it Effectively
05:19

Taking our wireless pen-testing knowledge to the next level.

Course Conclusion
04:21
About the Instructor
Packt Publishing
3.9 Average rating
3,985 Reviews
32,160 Students
318 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.