WiFi Pentesting
Understand the basics of the WiFi protocol and the various security standards, including WiFi Protected Access 3 (WPA3). Learn the tools to use for recon and attack. Practice in emulated WiFi environments without any hardware requirements.
Build Your Cybersecurity Credentials
Live Session Schedule
Enterprise-grade Training
Meet the instructor
Nishant Sharma
Nishant Sharma is a Security Research Manager at INE where he manages the development of next-generation on-demand labs. Prior to INE, he worked as R&D Head of Pentester Academy (Acquired by INE) where he has led a team of developers/researchers to create content and platform features for AttackDefense. He has also developed multiple gadgets for WiFi pentesting/monitoring such as WiMonitor, WiNX and WiMini. With over 9+ years of experience in development and content creation, he has conducted trainings/workshops at Blackhat Asia/USA, HITB Amsterdam/Singapore, OWASP NZ day, DEFCON USA villages. He has presented/published his work at Blackhat USA/Asia Arsenal, DEFCON USA/China, Wireless Village, Packet Village and IoT village. He has also conducted WiFi Pentesting training at Blackhat USA 2019, 2021. He had started his career as a firmware developer at Mojo Networks (Acquired by Arista) where he worked on new features for the enterprise-grade WiFi APs and maintenance of state-of-the-art WIPS. He has a Master degree in Information Security from IIIT Delhi. He has also published peer-reviewed academic research on HMAC security. His areas of interest include WiFi, Azure and Container security.
Who should join this bootcamp?
1. Anyone wanting to enter the industry as a network pentester
2. WiFi security enthusiasts and beginners
3. Suitable for beginners – all you need is a laptop and basic working knowledge of Linux.
2. WiFi security enthusiasts and beginners
3. Suitable for beginners – all you need is a laptop and basic working knowledge of Linux.
Prerequisites
1. A basic knowledge of computers and networking
2. Familiarity with the Linux operating system
Course reviews
Charles Faes
Network and Security Engineer, Belgium
Module I: Protocol Basics, Traffic Sniffing, and Recon
-
WiFi standard basics
-
Bands
-
Channels
-
SSID
-
BSSID
-
Frame structure and header
-
Transmission basics
-
Basic commands to interact with WiFi interface
-
Traffic sniffing
-
WiFi traffic sniffing
-
Monitor mode
-
Remote sniffing
-
Capturing and storing traffic
-
Discovering wireless networks and clients
-
Analyzing WiFi traffic (header/packet analysis)
Module II: Attacking Personal Networks
-
Introduction to WiFi security schemes
-
WEP
-
WEP-40
-
WEP-104
-
Encryption-based
-
WPA (TKIP)
-
WPA2 (CCMP)
-
Management modes
-
Personal Network (PSK)
-
Enterprise network (EAP or MGT)
-
Observing the difference in packets
-
Lab 3 mentioned in module I
-
Cracking WEP
-
Theory and explanation
-
Live WEP cracking
-
Decrypting WEP traffic
-
Cracking WPA/WPA2-PSK
-
Theory and explanation
-
Live WPA-PSK cracking
-
Decrypting WPA-PSK traffic
-
AP-less Attacks
Module III: Attacking Enterprise Networks
-
Understanding WPA/WPA2-EAP
-
PEAP
-
GTC
-
MSCHAPv2
-
TTLS
-
PAP
-
MSCHAPv2
-
Honeypot attacks
-
Creating fake networks
-
Evil twin attack
-
Karma attacks
-
Attacking WPA/WPA2-PEAP
-
Theory and explanation
-
PEAP-GTC
-
PEAP-MSCHAPv2
-
Attacking WPA/WPA2-TTLS
-
Theory and explanation
-
TTLS-PAP
-
TTLS-MSCHAPv2
Module IV: Advanced Attacks and WPA3
-
PEAP-relay attack
-
WiFi pivoting
-
Introduction to WPA3
-
WPA3-OWE (Opportunistic Wireless Encryption)
-
WPA3-SAE (Simultaneous Authentication of Equals)
-
WPA3-SAE Transition Mode
-
WPA3-Enterprise
-
Proposed attacks on WPA3
Meet the instructor
Nishant Sharma
Nishant Sharma is a Security Research Manager at INE where he manages the development of next-generation on-demand labs. Prior to INE, he worked as R&D Head of Pentester Academy (Acquired by INE) where he has led a team of developers/researchers to create content and platform features for AttackDefense. He has also developed multiple gadgets for WiFi pentesting/monitoring such as WiMonitor, WiNX and WiMini. With over 9+ years of experience in development and content creation, he has conducted trainings/workshops at Blackhat Asia/USA, HITB Amsterdam/Singapore, OWASP NZ day, DEFCON USA villages. He has presented/published his work at Blackhat USA/Asia Arsenal, DEFCON USA/China, Wireless Village, Packet Village and IoT village. He has also conducted WiFi Pentesting training at Blackhat USA 2019, 2021. He had started his career as a firmware developer at Mojo Networks (Acquired by Arista) where he worked on new features for the enterprise-grade WiFi APs and maintenance of state-of-the-art WIPS. He has a Master degree in Information Security from IIIT Delhi. He has also published peer-reviewed academic research on HMAC security. His areas of interest include WiFi, Azure and Container security.
Can't attend this bootcamp? Get informed about future bootcamps!
Thank you!