Autoplay
Autocomplete
Previous Lesson
Complete and Continue
BackTrack 5 Wireless Penetration Testing
Introduction
Introduction (2:28)
Getting Started
Requirements for Setting Up Your Wireless Lab (7:26)
Setting Up BackTrack (Download and Installation) (3:06)
Setting Up Your Wireless Access Points (APs) and Clients (1:33)
Wireless Networks – Rewards and Risks
WLAN Theory Essentials (9:32)
An Introduction to Wireless Frames (11:57)
An Introduction to aircrack-ng (4:16)
Capturing and Deciphering Wireless Frames (5:00)
WLAN Authentication – Getting Past Invisible Barriers
An Introduction to Wireless Authentication Protocols (8:29)
Revealing Hidden SSIDs (5:24)
Getting Past Open Authentication by Defeating MAC Filters (4:40)
Bypassing Shared Key Authentication (SKA) (6:03)
Exploiting WLAN Encryption Flaws
An Introduction to Wireless Encryption Protocols (7:58)
Cracking WEP Encryption (6:13)
Cracking WPA/WPA2 Pre-shared Keys (6:45)
Connecting to Compromised Networks (4:09)
WLAN Infrastructure – Threats and Countermeasures
Exploiting Default Credentials (3:49)
Denial-of-service (DoS) Attacks (5:20)
Attacking WPS (4:27)
Evil Twin Attack and Honeypots (4:41)
Advanced Client-based WiFi Attacks
An Introduction to Client-based Attacks (9:27)
Attacking Clients using Honeypots (2:00)
Hands-on Demonstration: Caffé Latte Attack (2:09)
Hands-on Demonstration: Hirte Attack (1:49)
Cracking WPA without an AP (3:52)
WLAN Security – Taking It One Step Further
An Introduction to Man-in-the-middle (MITM) Attacks (5:03)
Essential Steps: Wireless MITM Attacks (6:14)
Eavesdropping and Session Hijacking (4:41)
Detecting Client Security Settings (4:36)
Enterprise Wireless Hacking
Setting up FreeRADIUS-WPE (5:28)
Hands-on Demonstration: Cracking PEAP (4:15)
Hands-on Demonstration: Cracking EAP-TTLS (3:06)
Security Best Practices for Enterprise WLANs (4:25)
WLAN Penetration Testing – Doing it Effectively!
WLAN Penetration Testing: Doing it Effectively (4:50)
Course Conclusion (3:53)
An Introduction to Wireless Frames
Complete and Continue