×
Phoenix TS

Wireless Hacking Training

This training addresses security concerns and teaches students how to best defend wireless systems against attacks. 

Course Overview

Our 4-day, instructor-led Wireless Hacking training course is designed for IT professionals in the field of cyber security such as forensic investigators and malware analysts. It covers:

  • The basics of wireless security
  • Effective attack methods & remediation tactics
  • 802.11 wireless networks deployed within a home or enterprise setting
  • 802.11 wireless networks with a client focus
  • Hacking additional wireless technologies

Prerequisites: Before taking this course, you should have at least two years of networking experience. It is also recommends that you have either the CompTIA® Network+, Security+ or EC-Council® CEH Certification.

Schedule

Wireless Hacking Training

date
location
price
4/17/23 - 4/20/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$1,990
4/24/23 - 4/27/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,990
4/24/23 - 4/27/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$1,990
6/20/23 - 6/23/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,990
7/17/23 - 7/20/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$1,990
7/24/23 - 7/27/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,990
7/24/23 - 7/27/23 (4 days)

8:30AM - 4:30PM

Columbia, MD (UMBC)
Open
$1,990
10/16/23 - 10/19/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$1,990
10/23/23 - 10/26/23 (4 days)

8:30AM - 4:30PM

Online
Open
$1,990
10/23/23 - 10/26/23 (4 days)

8:30AM - 4:30PM

Columbia, MD (UMBC)
Open
$1,990
[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

802.11 Hacking

  • Basics of 802.11
  • Hardware and Drivers

Operating Systems and Tools for 802.11 Networks

  • Choosing an OS based on Hardware and Applications
  • inSIDer and Vistumbler Windows Network Scanners
  • Sniffing and Injection Tools for Windows
  • KisMAC Mac OS X Discovery Tool
  • Kismet Linux Discovery Tool 
  • Mobile Discovery Tools and Online Mapping

Tools and Techniques for Bypassing 802.11 Wireless Networks

  • Basic Attack Types
  • Accessing Hidden or Nonbroadcasting Wireless Networks
  • Cracking WEP Keys
  • Cracking Hidden and WEP-Encrypted Networks
  • Recovering a Keystream
  • Deauth Attacks and Michael Countermeasures

Practical Attacks against WPA Networks

  • Breaking WPA with Pre-Shared Key (PSK) Authentication 
  • Breaking WPA Enterprise Authentication
  • Encryption Attacks against TKIP
  • Attacking Components

Compromising Wireless Clients

  • Application Level Attacks
  • Client Attacks with an Evil DNA Server
  • ARP Spoofing with Ettercap
  • Rogue Apps and Evil Servers with Karmetasploit
  • Direct Client Injection
  • Device Driver Vulnerabilities
  • WI-FI and Web Hacking

Exploiting a Mac OS X 802.11 Wireless Client

  • Preparing and Testing the Exploit
  • Preparing Tools for Installation
  • Initial Reconnaissance Preparation
  • Kismet, Aircrack-ng Preparation
  • Preparing and Executing the Package  
  • Delivering the Java Exploit  
  • Using the User-Level Code Execution to the Highest Extent

Exploiting a Windows Wireless Client

  • Overview of a Windows Client Attack
  • Establish the Attack Infrastructure
  • Exploiting a Hotspot Environment
  • Controlling the Client
  • Wireless Reconnaissance – Local and Remote
  • Target Wireless Network Attack

Bluetooth Scanning and Reconnaissance

  • Overview of Bluetooth Device Interaction
  • Attack Preparation
  • Reconnaissance Phase of a Bluetooth Attack
  • SDPtool for Enumerating Services

Bluetooth Eavesdropping Attacks

  • Using Commercial Bluetooth Sniffers
  • Open-Source Bluetooth Tools

Attacking and Exploiting Bluetooth

  • PIN Attacks
  • Practical PIN Cracking
  • Manipulating Bluetooth Identification Mechanisms
  • Vulnerabilities in Bluetooth Profiles
  • Future of Bluetooth

ZigBee Protocol  

  • Overview of ZigBee Technology
  • ZigBee Security Measures
  • ZigBee Attack and Exploitation
  • Start to Finish Attack against ZigBee Device Implementation 

Hack DECT

  • Overview of DECT Devices and Technology
  • DECT Security Standards
  • DECT Attacks and deDECTed.org

Scoping and Information Gathering

  • Pre-Assessment Planning Process
  • Assessing Information and Estimating Effort

Wireless Hacking Training FAQs

Who should take this course?

This course is intended for CIO Officers, Forensics Investigators, and
Malware Analysts.

What is the recommended experience for this course?

Students should have at least two years of work experience in networking and hold CompTIA Network+, Security+ and EC-Council CEH certifications or hold equivalent experience and knowledge.

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)