Free Sample
+ Collection

BackTrack 5 Wireless Penetration Testing [Video]

Farrukh Haroon Farhat

Watch and learn about wireless penetration testing using the latest version of the BackTrack penetrating testing suite
$72.25
RRP $84.99

Want this title & more?

$21.99 p/month

Subscribe to PacktLib

Enjoy full and instant access to over 2000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.

Video Details

ISBN 139781782161202
Course Length3 hours

About This Video

  • An ideal video course that provides the right blend between the theoretical fundamentals and the practical essentials of wireless penetration testing
  • Covers the various facets of wireless penetration testing including attacks on the WEP, WPA, WPA2, WPS, EAP protocols, DoS attacks, MITM attacks, enterprise wireless attacks, and many more!
  • Covers some of the latest developments in wireless security penetration testing like WPS PIN brute forcing, cloud-based MS-CHAP decryption using ChapCrack, and many more

Who This Video Is For

This course is aimed at security professionals and IT professionals who want to learn about wireless penetration testing using the BackTrack Linux security distribution. The course assumes that you already know the basics of wireless networks and can operate at least one Linux distribution.

Table of Contents

Introduction
Introduction
Getting Started
Requirements for Setting Up Your Wireless Lab
Setting Up BackTrack (Download and Installation)
Setting Up Your Wireless Access Points (APs) and Clients
Wireless Networks – Rewards and Risks
WLAN Theory Essentials
An Introduction to Wireless Frames
An Introduction to aircrack-ng
WLAN Authentication – Getting Past Invisible Barriers
An Introduction to Wireless Authentication Protocols
Revealing Hidden SSIDs
Getting Past Open Authentication by Defeating MAC Filters
Bypassing Shared Key Authentication (SKA)
Exploiting WLAN Encryption Flaws
An Introduction to Wireless Encryption Protocols
Cracking WEP Encryption
Cracking WPA/WPA2 Pre-shared Keys
Connecting to Compromised Networks
WLAN Infrastructure – Threats and Countermeasures
Exploiting Default Credentials
Denial-of-service (DoS) Attacks
Attacking WPS
Evil Twin Attack and Honeypots
Advanced Client-based WiFi Attacks
An Introduction to Client-based Attacks
Attacking Clients using Honeypots
Hands-on Demonstration: Caffé Latte Attack
Hands-on Demonstration: Hirte Attack
Cracking WPA without an AP
WLAN Security – Taking It One Step Further
An Introduction to Man-in-the-middle (MITM) Attacks
Essential Steps: Wireless MITM Attacks
Eavesdropping and Session Hijacking
Detecting Client Security Settings
Enterprise Wireless Hacking
Setting up FreeRADIUS-WPE
Hands-on Demonstration: Cracking PEAP
Hands-on Demonstration: Cracking EAP-TTLS
Security Best Practices for Enterprise WLANs
WLAN Penetration Testing – Doing it effectively!
WLAN Penetration Testing: Doing it effectively
Course Conclusion

What You Will Learn

  • Crack WEP, WPA, WPA2, WPS, EAP/Radius based wireless networks
  • Creating a practice lab for wireless penetrating testing purposes
  • Sniff out and analyze wireless packets from the air
  • Penetrate wireless networks based on the enterprise versions of WPA and WPA2
  • Attack the WLAN infrastructure itself using DoS attacks, Fake APs, and other techniques

In Detail

Wi-Fi is a popular technology that helps satisfy our need for continuous connectivity with some inherent security risks and vulnerabilities. In a society with an increasing level of discoveable Wi-Fi networks, wireless penetration testing allows you to verify whether your own networks are as secure as you'd like them to be.

Armed with the essentials, you will learn how to conduct a host of cutting edge wireless attacks. You will learn how to execute attacks such as WLAN packet sniffing, revealing hidden SSIDs, open authentication by defeating MAC address filters, bypassing shared authentication, cracking WEP and WPA/WPA2 encryption.

In addition to documenting the essentials of wireless penetration testing, we will also discuss setting up rogue APs and wireless evil twins, client-based WEP cracking attacks, wireless infrastructure-based attacks, WPS PIN brute force attacks, denial of service (DoS) attacks, eavesdropping and session hijacking, EAP-based enterprise wireless hacking; and much more. Coverage also includes various countermeasures to protect wireless networks against these types of attacks, in order to help bolster the wireless security of any given network.

Authors

Read More

Recommended for You

BackTrack 5 Wireless Penetration Testing Beginner’s Guide
$ 29.99
BackTrack 4: Assuring Security by Penetration Testing
$ 29.99
BackTrack – Testing Wireless Network Security
$ 13.99
Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]
$ 34.00
Kali Linux Wireless Penetration Testing Beginner's Guide
$ 28.80