Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hacking Wireless Networks. Theory and practice.
Download your Training Operating System v2.0 CE
Download the TOS v2.0 CE (CUDA Extension) ISO image
Download the whole course Handbook
Download the course Handbook in PDF
Course overview
Table of contents
Legal information
Introduction to wireless networks
Introduction
Wireless transmission standards
802.11 wireless network types
Encryption and authentication standards
Wireless network cards in Linux - overview
Wireless network interface cards in Linux (1:45)
Wireless security (half) measures: An overview
MAC address filtering
Changing the MAC address of the wireless network card (4:24)
Disabling ESSID broadcast
Finding a hidden access point with disabled ESSID broadcast (4:13)
Limiting wireless coverage
Wireless network attacks independent of used encryption
Introduction
DoS: RF jamming
DoS: CSMA/CA jamming
The use of deauthentication attack for jamming network traffic (4:02)
DoS: Deauthentication attack
Wireless MITM
WEP attacks
Section outline
WEP encryption
Chopchop
The overview and demonstration of the chop-chop attack (3:15)
Keystream reuse
Generating packets without knowing the network key (3:40)
Interactive packet replay and ARP request replay (4:52)
The demonstration of the PTW and KoreK attacks (2:43)
Caffe Latte Attack
Creating a fake access point – the Caffe Latte attack (2:07)
WPA attacks
Introduction
WPA
The dictionary attack on WPA (2:46)
WPA2
Rainbow tables
The dictionary attack on WPA – using hash tables (2:10)
Cowpatty attack
DoS: Taking advantage of the MIC failure holdoff time
CUDA-powered attacks
What is CUDA?
CUDA – the initial preparation of the environment (1:29)
The installation of CUDA-SDK and CUDA-Toolkit (2:39)
The compilation and installation of the tools with CUDA support (5:34)
The optimization of the parameters of an nVidia video card (3:56)
CUDA – preparation for the attack (2:23)
CUDA – the attack on WPA (8:17)
Generating your own dictionary (2:13)
Applications for cracking MD4 and MD5 hashes with the use of CUDA technology (4:28)
Wardriving experiment
Advanced attacks against WPA
WKA TKIP attack
WPA TKIP broken
Beck-Tews attack enhanced
Michael Reset attack
Summary
Course summary and references
Summary
References
BONUS section
Hacking in Practice MEGA Course - WiFi security module 1 (27:34)
Hacking in Practice MEGA Course - WiFi security module 2 (18:35)
Download the course Handbook in PDF
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock