O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

BackTrack 5 Wireless Penetration Testing

Video Description

Watch and learn about wireless penetration testing using the latest version of the BackTrack penetrating testing suite

About This Video

  • An ideal video course that provides the right blend between the theoretical fundamentals and the practical essentials of wireless penetration testing

  • Covers the various facets of wireless penetration testing including attacks on the WEP, WPA, WPA2, WPS, EAP protocols, DoS attacks, MITM attacks, enterprise wireless attacks, and many more!

  • Covers some of the latest developments in wireless security penetration testing like WPS PIN brute forcing, cloud-based MS-CHAP decryption using ChapCrack, and many more

  • In Detail

    Wi-Fi is a popular technology that helps satisfy our need for continuous connectivity with some inherent security risks and vulnerabilities. In a society with an increasing level of discoveable Wi-Fi networks, wireless penetration testing allows you to verify whether your own networks are as secure as you'd like them to be.

    Armed with the essentials, you will learn how to conduct a host of cutting edge wireless attacks. You will learn how to execute attacks such as WLAN packet sniffing, revealing hidden SSIDs, open authentication by defeating MAC address filters, bypassing shared authentication, cracking WEP and WPA/WPA2 encryption.

    In addition to documenting the essentials of wireless penetration testing, we will also discuss setting up rogue APs and wireless evil twins, client-based WEP cracking attacks, wireless infrastructure-based attacks, WPS PIN brute force attacks, denial of service (DoS) attacks, eavesdropping and session hijacking, EAP-based enterprise wireless hacking; and much more. Coverage also includes various countermeasures to protect wireless networks against these types of attacks, in order to help bolster the wireless security of any given network.

    Table of Contents

    1. Chapter 1: Introduction
      1. Introduction 00:02:32
    2. Chapter 2: Getting Started
      1. Requirements for Setting Up Your Wireless Lab 00:07:54
      2. Setting Up BackTrack (Download and Installation) 00:03:28
      3. Setting Up Your Wireless Access Points (APs) and Clients 00:01:43
    3. Chapter 3: Wireless Networks – Rewards and Risks
      1. WLAN Theory Essentials 00:10:37
      2. An Introduction to Wireless Frames 00:13:35
      3. An Introduction to aircrack-ng 00:04:57
      4. Capturing and Deciphering Wireless Frames 00:06:01
    4. Chapter 4: WLAN Authentication – Getting Past Invisible Barriers
      1. An Introduction to Wireless Authentication Protocols 00:09:18
      2. Revealing Hidden SSIDs 00:05:45
      3. Getting Past Open Authentication by Defeating MAC Filters 00:04:57
      4. Bypassing Shared Key Authentication (SKA) 00:06:27
    5. Chapter 5: Exploiting WLAN Encryption Flaws
      1. An Introduction to Wireless Encryption Protocols 00:09:03
      2. Cracking WEP Encryption 00:06:59
      3. Cracking WPA/WPA2 Pre-shared Keys 00:07:38
      4. Connecting to Compromised Networks 00:05:17
    6. Chapter 6: WLAN Infrastructure – Threats and Countermeasures
      1. Exploiting Default Credentials 00:04:08
      2. Denial-of-service (DoS) Attacks 00:05:34
      3. Attacking WPS 00:04:53
      4. Evil Twin Attack and Honeypots 00:05:22
    7. Chapter 7: Advanced Client-based WiFi Attacks
      1. An Introduction to Client-based Attacks 00:10:03
      2. Attacking Clients using Honeypots 00:02:05
      3. Hands-on Demonstration: Caffé Latte Attack 00:02:11
      4. Hands-on Demonstration: Hirte Attack 00:01:50
      5. Cracking WPA without an AP 00:04:01
    8. Chapter 8: WLAN Security – Taking It One Step Further
      1. An Introduction to Man-in-the-middle (MITM) Attacks 00:05:40
      2. Essential Steps: Wireless MITM Attacks 00:06:21
      3. Eavesdropping and Session Hijacking 00:04:46
      4. Detecting Client Security Settings 00:04:45
    9. Chapter 9: Enterprise Wireless Hacking
      1. Setting up FreeRADIUS-WPE 00:05:41
      2. Hands-on Demonstration: Cracking PEAP 00:04:31
      3. Hands-on Demonstration: Cracking EAP-TTLS 00:03:33
      4. Security Best Practices for Enterprise WLANs 00:04:59
    10. Chapter 10: WLAN Penetration Testing – Doing it Effectively!
      1. WLAN Penetration Testing: Doing it Effectively 00:05:19
      2. Course Conclusion 00:04:22