Sale!

Red Team Wi-Fi offensive attacks and counter measurements

Original price was: $50.00.Current price is: $15.00.

Price: 15.00 USD | Size: 13.3 GB |   Duration : 6+ Hours  | 28 Video Lessons | 

BRAND:  

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

Description

Price: 15.00 USD | Size: 13.3 GB |   Duration : 6+ Hours  | 28 Video Lessons | 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

Red Team Wi-Fi

“Securing Networks: Red Team Wi-Fi Offensive Attacks and Countermeasures” This course covers Wi-Fi offensive attacks and counter measurements for Red Team and Blue Team purposes.

A few more words about this course

Many publications exist documenting ways to attack Wi-Fi networks. Still, the gap between old methods that have become obsolete and the current state and outdated tools can be frustrating for someone who wants to learn or even update his knowledge in this field.

This course aims to learn the modern ways of assessing the security of Wi-Fi networks and how to apply these attacks against organizations during a Red Team engagement. Indeed, during this course, we will be able to start from the very beginning by talking about old, current, and new attacks and opportunities to allow attendees to fulfill their pentest or Red Team engagements in the future based on our recent experiences.”Securing Networks: Red Team Wi-Fi Offensive Attacks and Countermeasures”
Throughout this course, you will discover:

  • Introduction on actual Wi-Fi setups, standards, and common attacks
  • Monitoring and capturing signal over-the-air,
  • Analyzing the signal,
  • Using the right tools at the right moment,
  • Attacking communications (injection, cracking, etc.)

Attacks in WEP, WPA/WPA2,

  • Study the case of WPA3,
  • The case of open networks,

rogue AP,

  •  Stack protocol vulnerabilities,
  • Red Team tricks,
  • etc.

Requirements

  • Basics skills with Linux command lines
  • A Raspberry Pi 4
  • Optionally a computer with Linux to perform attacks with a faster computer
  • Wi-Fi dongle of choice: Alfa AWUS036ACH (a/b/g/n/ac), or Alfa AWUS036ACM (a/b/g/n/ac), or Alfa AWUS036AXML (a/b/g/n/ac/ax) for 2.4 GHz – 6GHz bands

01 Introduction

This part will introduce all the essential concepts of Wi-Fi. Indeed, starting with usages, topologies, and standards, attendees should have a well-condensed reminder to be able for the attacks later.
Setup
00:17
IEEE 802.11, uses cases, important 802.11 standards and amendments, the different layers
25:59
Wi-Fi 6/6E and Wi-Fi 7
03:43
Wireless networks (modes, infrastructures) + exercises
14:17
Listing capabilities correction
22:13
RF transmission, Wi-Fi cards, boosting transmission, and RF physical aspects
03:55
Linux kernel module, *MACs, patching
08:24

02 Network introspection

This part aims to be practical, using different techniques to identify the other network to focus on our target(s).
Network enumeration + exercises
01:43
Scanning
06:12
Capturing the traffic in promiscous mod
10:29
Monitoring and useful tools
07:54
Kismet
14:20
Airodump-ng
20:02
Manipulating packets with Scapy
27:04
Introspecting Wi-Fi 6/6E channels
03:30
Going low level on radio
06:58

03 Attacks and risks

After learning about monitoring, captures, and packet manipulations, we will see different cases and understand the opportunities an attacker can take when attacking a network. This part will go through old vulnerabilities that can still exist in some context to the newest attack opportunities, including recent tools.
Risks, security state of the art (open, WEP, WPA/WPA2 PSK and MGT, etc.), hotspot and evil-twin attacks + exercises
25:48
Further tools, IDS and scanning attacks
39:08
Attacks on WEP + exercises
08:45
Correction of WEP exercises
17:09
Attacks on WPA/WPA2 + exercises
11:02
Fixing issues on the exercise
01:06
Correction of the WPA2 PSK exercise
10:32
Further attacks on WPA2 PSK, powerful tools, attacks on WPA2 MGT + exercises
12:14
Correction + further techniques
19:12
EAP downgrade (old but could still happen…), relays, mitigations, WPS
03:57
Security and attacks against WPA3 + exercises
03:12
Other opportunistic attacks, vulnerability hunting
08:19
Last Red Teaming tricks
23:47

04 Completion

Completion

 

 

 


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…