Wireless Security Attacks – Workshop eBook

$79.00


Get the access to all our courses via Subscription

Subscribe

Categories: ,

Description

Table of contents


MODULE 1: WIRELESS NETWORKING BASICS
Wireless Networking Basics and Terminology
802.11 Signal Coverage and Channel Usage
Lab Hardware Setup
Lab Software Setup and Configuration
Module 1 Challenge – MAC Filtering Bypass


MODULE 2: WIRED EQUIVALENT PRIVACY
Wireless IV Weaknesses and Decloaking
Module 2, Challenge 1: Non-Broadcasting SSID
Module 2, Challenge 2: WEP Attacks


MODULE 3: WI-FI PROTECTED ACCESS
WPA Handshake and WPS Weaknesses
Module 3, Challenge 1: WPA Attack
Module 3, Challenge 2: WPS Attack


MODULE 4: WI-FI PROTECTED ACCESS 2
Automated Attack Tools
Module 4, Challenge 1: WPA2 Attack
Module 4, Challenge 2: Automated Attack Tools


About the author:

IMG_0003Shad Malloy is a Network Security Analyst with a wide range of experience including virtualization, firewalls, SCADA, and enterprise security. Shad has over 16 years of experience as an information technology professional, with 6 years of penetration testing experience. He has worked with commercial and government clients including creation of the penetration testing program for Indian Health Services.

As a Network Security Analyst, Shad evaluates the internal and external security postures of enterprise networks. He surveys the client’s network infrastructure, finding and reporting on exposed or at-risk configurations. After demonstrating how vulnerabilities in the client’s network can be exploited to grant access and/or reveal sensitive data, he educates clients on the best ways to safeguard their environments.

Shad’s research focuses on the development of a Shellshock User-agent scanner and wireless attacks. He received his Bachelors of Computer Information Systems (B.S.) in 2003 from National American University.

Relevant Certifications:

    • Certified Information System Security Professional (CISSP)

    • Certified Ethical Hacker (CEH)

    • Certified Security Analyst (ECSA)

    • Certified Intrusion Prevention Specialist (CIPS)


Check out the full course here: CLICK! 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013