Description
Price: 15.00 USD | Size: 13.3 GB | Duration : 6+ Hours | 28 Video Lessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 



4.9
Red Team Wi-Fi
“Securing Networks: Red Team Wi-Fi Offensive Attacks and Countermeasures” This course covers Wi-Fi offensive attacks and counter measurements for Red Team and Blue Team purposes.
A few more words about this course
Throughout this course, you will discover:
- Introduction on actual Wi-Fi setups, standards, and common attacks
- Monitoring and capturing signal over-the-air,
- Analyzing the signal,
- Using the right tools at the right moment,
- Attacking communications (injection, cracking, etc.)
Attacks in WEP, WPA/WPA2,
- Study the case of WPA3,
- The case of open networks,
rogue AP,
- Stack protocol vulnerabilities,
- Red Team tricks,
- etc.
Requirements
01 Introduction
This part will introduce all the essential concepts of Wi-Fi. Indeed, starting with usages, topologies, and standards, attendees should have a well-condensed reminder to be able for the attacks later.
Setup
IEEE 802.11, uses cases, important 802.11 standards and amendments, the different layers
Wi-Fi 6/6E and Wi-Fi 7
Wireless networks (modes, infrastructures) + exercises
Listing capabilities correction
RF transmission, Wi-Fi cards, boosting transmission, and RF physical aspects
Linux kernel module, *MACs, patching
02 Network introspection
This part aims to be practical, using different techniques to identify the other network to focus on our target(s).
Network enumeration + exercises
Scanning
Capturing the traffic in promiscous mod
Monitoring and useful tools
Kismet
Airodump-ng
Manipulating packets with Scapy
Introspecting Wi-Fi 6/6E channels
Going low level on radio
03 Attacks and risks
After learning about monitoring, captures, and packet manipulations, we will see different cases and understand the opportunities an attacker can take when attacking a network. This part will go through old vulnerabilities that can still exist in some context to the newest attack opportunities, including recent tools.
Risks, security state of the art (open, WEP, WPA/WPA2 PSK and MGT, etc.), hotspot and evil-twin attacks + exercises
Further tools, IDS and scanning attacks
Attacks on WEP + exercises
Correction of WEP exercises
Attacks on WPA/WPA2 + exercises
Fixing issues on the exercise
Correction of the WPA2 PSK exercise
Further attacks on WPA2 PSK, powerful tools, attacks on WPA2 MGT + exercises
Correction + further techniques
EAP downgrade (old but could still happen…), relays, mitigations, WPS
Security and attacks against WPA3 + exercises
Other opportunistic attacks, vulnerability hunting
Last Red Teaming tricks
04 Completion
Completion
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.