Offensive Wi-Fi Security
The popularity of mobile devices and the Internet of Things over the past few years has led to a growth in wireless networking. Who wouldn't like to work or watch movies in their preferred chair at home or in the office? People may now effortlessly access the internet without needing to connect their gadgets to tangled LAN cords. However, this increased reliance on wireless technology also presents a number of new security risks, including the risk of offensive attacks. In this series, I will discuss the concepts of wireless security and various types of offensive attacks that can be carried out against wireless networks.
Despite the fact that it has been extensively studied from an infosec perspective, I'm here to address "what" and "why" questions regarding this topic in the way I had learned things and make it very simple for you to understand.
Prerequisite Knowledge
- Basic of Linux commands, shell scripting and text editors
- OSI Model in the Networking (optional)
Topics
- Introduction to Wireless Networking
- Frequency Bands in Wi-Fi Networks
- Understand MAC Header Format in Detail
- Traffic Analysis using Wireshark
- WiFi Standard 802.11ac Packet Analysis
- Preferred Network Lists (PNL) in Details
- WiFi Traffic Reconnaissance using Aircrack-ng Suite
- Understand Legacy Security Mechanisms
- Bypass MAC Filtering using MACChanger Tool
- Creating Honeypot Access Points using Hostapd
- Understanding WEP Encryption in Details
- Decrypt WEP Traffic with Insufficient Initial Vectors
- Break into the Personal WiFi Network and Interact with Services
- Find Hidden Network Backdoor in WiFi Firmware
- Understand and Interact with OpenWRT
- Robust Security Network and Extended Authentication Protocol in Detail
- Difference between WPA and WPA2
- Crack Pre-Shared Key of WPA/WPA2 from Live Network
- Crack WPA2-PSK from Probing Clients
- – discuss enterprise –
- Steal WiFi Logins from Enterprise Network
- Evil Twin Enterprise WiFi Network using Hostapd-Mana
- Pivoting Over TTLS-PAP WPA Enterprise Networks
- Pivoting Over Challenge Based Enterprise WiFi Network
- Evil Twin with Karma Attack in Enterprise WiFi Network
- – discuss wpa 3 –