O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Professional Guide to Wireless Network Hacking and Penetration Testing

Video Description

In this Professional Guide to Wireless Network Hacking and Penetration Testing training course, expert author Ric Messier will teach you the tools and techniques needed to effectively secure your 802.11 and Bluetooth networks. This course is designed for users that already have basic working knowledge of networking concepts.

You will start by learning the basics of 802.11, such as frequencies, access points, associations, and enterprise networks. From there, Ric will teach you how to secure your wireless network. This video tutorial also covers wireless attack tools and wireless attacks. You will also learn about access point attacks and Bluetooth, such as Bluetooth authentication, BT scanner, and how to protect Bluetooth. Finally, you will cover other wireless communications, such as WiMax, ZigBee, and RFID.

Once you have completed this computer based training course, you will be fully capable of securing your 802.11 and Bluetooth networks using the tools and techniques explained in this course.

Table of Contents

  1. Introduction
    1. Introduction And About The Author 00:01:34
    2. What We Will Cover 00:03:13
    3. System Requirements 00:04:40
    4. Legal Issues 00:02:38
    5. Penetration Testing 00:02:32
  2. 802.11
    1. 802.11 Basics 00:04:17
    2. Frequencies 00:06:09
    3. Access Points 00:03:41
    4. Ad-Hoc Versus Infrastructure Mode 00:02:40
    5. Wireless Modes - ABGN 00:04:19
    6. SSID, ESSID And BSSID 00:04:00
    7. MAC Address 00:04:30
    8. Associations 00:02:45
    9. Beaconing And Broadcasting 00:02:45
    10. Access Point Basics 00:05:08
    11. Enterprise Networks 00:03:48
    12. WiFi In Windows 00:03:20
    13. WiFi In Mac OS 00:02:41
    14. WiFi In Linux 00:03:52
  3. Securing Your Wireless Network
    1. Authentication 00:01:26
    2. 802.1X 00:04:01
    3. Radius 00:03:27
    4. Encryption 00:04:00
    5. WEP 00:03:20
    6. WPA 00:04:07
    7. WPA2 00:03:40
    8. WPS 00:01:55
    9. EAP 00:04:03
    10. Hiding Your Network 00:03:17
    11. Filtering 00:03:01
    12. Network Segmentation 00:04:19
    13. Default Configurations 00:03:17
  4. Wireless Attack Tools
    1. Built-In Tools 00:04:54
    2. Kali Linux 00:03:22
    3. Kismet 00:02:50
    4. Aircrack-Ng 00:04:03
    5. WiFi Explorer 00:04:08
    6. Wireshark 00:05:34
    7. Wireless Attack Toolkit 00:04:14
    8. NetStumbler 00:03:03
    9. Ettercap 00:04:10
    10. Dsniff 00:04:23
    11. Airpwn 00:04:04
    12. Aireplay-Ng 00:02:18
    13. Fern 00:03:28
    14. WiFi Tap 00:03:04
    15. Cowpatty 00:03:41
    16. WiFi-Honey 00:02:35
  5. Wireless Attacks
    1. Using Wireshark 00:03:06
    2. Capturing Network Packets 00:04:21
    3. Monitor Mode 00:03:19
    4. Investigating Packets 00:04:42
    5. Filtering 00:04:34
    6. Radio Traffic 00:05:10
    7. War Driving 00:02:37
    8. Frame Injection 00:02:52
    9. RADIUS Replay 00:02:56
    10. SSL Stripping 00:03:15
    11. De-Authentication 00:03:10
    12. Airodump 00:02:57
    13. Fake Authentication 00:02:26
  6. Access Point Attacks
    1. Replay Attacks 00:03:10
    2. Cracking WEP - Part 1 00:02:38
    3. Cracking WEP - Part 2 00:02:02
    4. Cracking WPA 00:02:06
    5. Rogue Access Points 00:03:16
    6. Man In The Middle Attacks 00:02:15
    7. MAC Changes 00:04:12
  7. Bluetooth
    1. Bluetooth Overview 00:04:21
    2. Bluetooth Authentication 00:06:20
    3. Bluetooth Profiles 00:03:33
    4. Bluesnarfer 00:03:52
    5. Blueranger 00:02:51
    6. BT Scanner 00:03:26
    7. Protecting Bluetooth 00:03:42
    8. Other Tools 00:02:44
  8. Other Wireless
    1. WiMax 00:03:40
    2. Near Field Communication 00:04:54
    3. ZigBee 00:02:44
    4. RFID 00:05:40
  9. Conclusion
    1. What Have We Covered 00:02:21
    2. Next Steps 00:03:42
    3. Conclusion 00:00:49