Exam Objective:

Session 01: IEEE 802.11

Session 02: Wireless Networks

Session 03: Packets and Network Interaction

Session 04: Getting Started

Session 05: Linux Wireless Stack and Drivers

Session 06: Aircrack-ng Essentials

Session 07: Cracking WEP with Connected Clients

Session 08: Cracking WEP via a Client

Session 09: Cracking Clientless WEP Networks

Session 10: Bypassing WEP Shared Key Authentication

Session 11: Cracking WPA/WPA2 PSK with Aircrack-ng

Session 12: Cracking WPA with JTR and Aircrack-ng

Session 13: Cracking WPA with coWPAtty

Session 14: Cracking WPA with Pyrit

Session 15: Additional Aircrack-ng Tools

Session 16: Wireless Reconnaissance

Session 17: Rogue Access Points

Detailed Syllabus:

Session 01: IEEE 802.11

IEEE
802.11 Standards and Amendments
Main 802.11 Protocols

Session 02: Wireless Networks

Wireless Operating Modes

Session 03: Packets and Network Interaction

Wireless Packets – 802.11 MAC Frame
Control Frames
Management Frames
Data Frames
Interacting with Networks

Session 04: Getting Started

Choosing Hardware
Choosing a Wireless Card
Choosing an Antenna

Session 05: Linux Wireless Stack and Drivers

ieee80211 vs. mac80211
Linux Wireless Drivers

Session 06: Aircrack-ng Essentials

Airmon-ng
Airodump-ng
Aireplay-ng
Injection Test

Session 07: Cracking WEP with Connected Clients

Initial Attack Setup
Aireplay-ng Fake Authentication Attack
Aireplay-ng Deauthentication Attack
Aireplay-ng ARP Request Replay Attack
Aircrack-ng

Session 08: Cracking WEP via a Client

Attack Setup
Aireplay-ng Interactive Packet Replay Attack
Cracking the WEP Key

Session 09: Cracking Clientless WEP Networks

Attack Assumptions
Attack Setup
Aireplay-ng Fragmentation Attack
Packetforge-ng
Aireplay-ng KoreK ChopChop Attack
Interactive Packet Replay and Aircrack-ng
Clientless WEP Cracking Lab

Session 10: Bypassing WEP Shared Key Authentication

Attack Setup
Aireplay-ng Shared Key Fake Authentication
ARP Request Replay and Aircrack-ng
Bypassing WEP Shared Key Authentication Lab

Session 11: Cracking WPA/WPA2 PSK with Aircrack-ng

Attack Setup
Aireplay-ng Deauthentication Attack
Aircrack-ng and WPA
Airolib-ng

Session 12: Cracking WPA with JTR and Aircrack-ng

Attack Setup
Editing John the Ripper Rules
Using Aircrack-ng with John the Ripper
John the Ripper Lab

Session 13: Cracking WPA with coWPAtty

Attack Setup
coWPAtty Dictionary Mode
coWPAtty Rainbow Table Mode
coWPAtty Lab

Session 14: Cracking WPA with Pyrit

Attack Setup
Pyrit Dictionary Attack
Pyrit Database Mode
Pyrit Lab

Session 15: Additional Aircrack-ng Tools

Airdecap-ng
Airserv-ng
Airtun-ng

Session 16: Wireless Reconnaissance

Airgraph-ng
Kismet
GISKismet
Wireless Reconnaissance Lab

Session 17: Rogue Access Points

Airbase-ng
Karmetasploit
Karmetasploit Configuration
Man in the Middle Attack
Rogue Access Points Lab

If You Like What We Do Here On PentesterWorld, You Should Consider:

Stay Connected to: Twitter | Facebook

Subscribe to our email updates: Sign Up Now

 

We are thankful for your support.