BackTrack 5 Wireless Penetration Testing

Watch and learn about wireless penetration testing using the latest version of the BackTrack penetrating testing suite
0.0 (0 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
151 students enrolled
$19
$85
78% off
Take This Course
  • Lectures 35
  • Length 3.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 11/2014 English

Course Description

Armed with the essentials, you will learn how to conduct a host of cutting edge wireless attacks. You will learn how to execute attacks such as WLAN packet sniffing, revealing hidden SSIDs, open authentication by defeating MAC address filters, bypassing shared authentication, cracking WEP and WPA/WPA2 encryption.

In addition to documenting the essentials of wireless penetration testing, we will also discuss setting up rogue APs and wireless evil twins, client-based WEP cracking attacks, wireless infrastructure-based attacks, WPS PIN brute force attacks, denial of service (DoS) attacks, eavesdropping and session hijacking, EAP-based enterprise wireless hacking; and much more. Coverage also includes various countermeasures to protect wireless networks against these types of attacks, in order to help bolster the wireless security of any given network.

About the Author

Farrukh Haroon Farhat is an information security professional with over 8 years of experience. He currently works as a Security Analyst in IBM’s Global Technology Services (GTS) division. As a member of the Managed Security Services (MSS) operations team, Farrukh works with multi-vendor network security technologies, helping customers improve their security posture. He's previously worked as the IT Security Manager for an emerging telecom operator based in the Middle East. He has also delivered various professional trainings related to Information Security and Networking. Farrukh hold’s various industry certifications such as CISSP, CISA, CCIE Security (#20184), JNCIE-Security (#91) et al. He actively contributes to various online communities related to network security like Cisco Netpro. As a result of his contribution to Cisco’s official support community, he was awarded the ‘Cisco Designated VIP (Security)’ accreditation in 2011.

What are the requirements?

  • The course assumes that you already know the basics of wireless networks and can operate at least one Linux distribution.
  • Designed as a practical video tutorial with step-by-step instructions to teach you about Wireless Penetration Testing, the course has been designed to ensure that topics are presented in a gradual manner, allowing you to grasp the information that's being presented before moving on to more advanced topics.

What am I going to get from this course?

  • Crack WEP, WPA, WPA2, WPS, EAP/Radius based wireless networks
  • Creating a practice lab for wireless penetrating testing purposes
  • Sniff out and analyze wireless packets from the air
  • Penetrate wireless networks based on the enterprise versions of WPA and WPA2
  • Attack the WLAN infrastructure itself using DoS attacks, Fake APs, and other techniques

What is the target audience?

  • This course is aimed at security professionals and IT professionals who want to learn about wireless penetration testing using the BackTrack Linux security distribution.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
02:32

This video will provide a brief overview of what we'll cover throughout the course.

Section 2: Getting Started
07:53

This video will help decide or choose which wireless hardware and software will best suit your needs.

03:27

This video will help to download and set up BackTrack 5 R2 for use in wireless penetration tests.

01:42

This video will help to set up Wi-Fi access points in three easy steps.

Section 3: Wireless Networks – Rewards and Risks
10:36

This video will revisit the theory of wireless networks.

13:35

This video will discuss the wireless packet structure and the various fields contained in it.

04:57

This video will discuss the various tools available within the aircrack-ng wireless penetration and attack suite.

06:01

Eavesdropping on and interpreting wireless frames using various tools, such as Wireshark, tshark, tcpdump, and airodump-ng.

Section 4: WLAN Authentication – Getting Past Invisible Barriers
09:18

This video will describe the theory of authentication in general, and wireless authentication protocols.

05:44

This video will demonstrate how to bypass hidden/invisible Wireless Service Set Identifies (SSIDs) using the wireshark and airodump-ng tools.

04:56

This video will demonstrate how easy it is to bypass MAC filters frequently employed by network administrators to secure Wi-Fi networks (by utilizing MAC spoofing).

06:27

This video will demonstrate how to bypass Shared Key Authentication even tough it uses an encrypted challenge handshake process.

Section 5: Exploiting WLAN Encryption Flaws
09:03

This video will describe the theory of encryption in general, and wireless encryption protocols.

06:59

This video will list three easy steps to find out the WEP encryption key.

07:37

This video will help understand the steps required to penetrate WPA or WPA2 PSK based wireless networks.

05:17

This video will demonstrate how we can capitalize on the cracked WEP or WPA keys or pass-phrases by authenticating and associating with the compromised network.

Section 6: WLAN Infrastructure – Threats and Countermeasures
04:07

This video will demonstrate how we can penetrate wireless networks using the default usernames and passwords that are bundled with various Wi-Fi devices such as access points.

05:34

Simulate a Denial-of-service (DoS) attack that is meant to shut down a machine or network.

04:53

This video will demonstrate how to exploit implementation weaknesses in the Wi-Fi Protected Access (WPS) feature, to gain access to the various security settings of vulnerable access points.

05:21

This video will demonstrate how to create software-based fake access points using the airbase-ng utility.

Section 7: Advanced Client-based WiFi Attacks
10:03

This video will help to understand how we can penetrate wireless networks using wireless end-stations only, without the need of other wireless network elements such as access points.

02:05

This video will demonstrate how to create software-based fake access points using the airbase-ng utility, based on the probe request packets sent by wireless clients.

02:11

This video will demonstrate how to utilize the message injection and bit-flipping techniques to crack WEP keys based on isolated wireless clients.

01:50

This video will show how to combine the Caffe Latte attack and fragmentation techniques to crack WEP keys, once again based on isolated wireless clients.

04:01

This video will demonstrate how to execute WPA or WPA2 pre-shared key (PSK) cracking attacks based on wireless clients.

Section 8: WLAN Security – Taking It One Step Further
05:39

This video will describe the theoretical details pertaining to MITM-based wireless attacks such as eavesdropping and session hijacking.

06:21

This video will demonstrate the essential configuration steps to set up our wireless network for man-in-the-middle attacks.

04:46

This video will demonstrate how to carry out eavesdropping and session hijacking attacks based on your MITM setup.

04:45

This video will demonstrate how to enumerate the wireless security profiles currently cached on wireless clients.

Section 9: Enterprise Wireless Hacking
05:40

This video will demonstrate how to set up the FreeRADIUS daemon and the associated Wireless Pwnage Edition (WPE) patch for WPA enterprise cracking.

04:31

Cracking PEAP due to improper configurations, such as a lack of certificate validation on the supplicant side.

03:33

Cracking EAP-TTLS due to improper configurations, such as a lack of certificate validation on the supplicant side.

04:59

This video will discuss the various best practices related to WPA- or WPA2-based enterprise WLANs.

Section 10: WLAN Penetration Testing – Doing it Effectively!
05:19

This video will discuss the four different phases or steps of the wireless penetration testing process.

04:21

Taking our wireless pen-testing knowledge to the next level.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Packt Publishing, Tech Knowledge in Motion

Over the past ten years Packt Publishing has developed an extensive catalogue of over 2000 books, e-books and video courses aimed at keeping IT professionals ahead of the technology curve. From new takes on established technologies through to the latest guides on emerging platforms, topics and trends – Packt's focus has always been on giving our customers the working knowledge they need to get the job done. Our Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.

Ready to start learning?
Take This Course