Table of contents
MODULE 1: WIRELESS NETWORKING BASICS
Wireless Networking Basics and Terminology
802.11 Signal Coverage and Channel Usage
Lab Hardware Setup
Lab Software Setup and Configuration
Module 1 Challenge – MAC Filtering Bypass
MODULE 2: WIRED EQUIVALENT PRIVACY
Wireless IV Weaknesses and Decloaking
Module 2, Challenge 1: Non-Broadcasting SSID
Module 2, Challenge 2: WEP Attacks
MODULE 3: WI-FI PROTECTED ACCESS
WPA Handshake and WPS Weaknesses
Module 3, Challenge 1: WPA Attack
Module 3, Challenge 2: WPS Attack
MODULE 4: WI-FI PROTECTED ACCESS 2
Automated Attack Tools
Module 4, Challenge 1: WPA2 Attack
Module 4, Challenge 2: Automated Attack Tools
About the author:
Shad Malloy is a Network Security Analyst with a wide range of experience including virtualization, firewalls, SCADA, and enterprise security. Shad has over 16 years of experience as an information technology professional, with 6 years of penetration testing experience. He has worked with commercial and government clients including creation of the penetration testing program for Indian Health Services.
As a Network Security Analyst, Shad evaluates the internal and external security postures of enterprise networks. He surveys the client’s network infrastructure, finding and reporting on exposed or at-risk configurations. After demonstrating how vulnerabilities in the client’s network can be exploited to grant access and/or reveal sensitive data, he educates clients on the best ways to safeguard their environments.
Shad’s research focuses on the development of a Shellshock User-agent scanner and wireless attacks. He received his Bachelors of Computer Information Systems (B.S.) in 2003 from National American University.
Relevant Certifications:
-
- Certified Information System Security Professional (CISSP)
-
- Certified Ethical Hacker (CEH)
-
- Certified Security Analyst (ECSA)
-
- Certified Intrusion Prevention Specialist (CIPS)