Join today

Red Team Wi-Fi

This course covers Wi-Fi offensive attacks and counter measurements for Red Team and Blue Team purposes.
Format

 Online
Course

Level

Beginner

Duration: 1 day and half

 > 6 hours + exercises

Hands-on

 Practice on a Wi-Fi target

Extra resources

 Raspberry Pi target image

Access

 3 months /  Unlimited (with subscription)

Certificate

  Completion

Price exclusive per learner
(ex. 20% VAT)

$736.67 for 3 months

Then $20/month with subscription

What you are going to learn

A few more words about this course

Many publications exist documenting ways to attack Wi-Fi networks. Still, the gap between old methods that have become obsolete and the current state and outdated tools can be frustrating for someone who wants to learn or even update his knowledge in this field.
This course aims to learn the modern ways of assessing the security of Wi-Fi networks and how to apply these attacks against organizations during a Red Team engagement. Indeed, during this course, we will be able to start from the very beginning by talking about old, current, and new attacks and opportunities to allow attendees to fulfill their pentest or Red Team engagements in the future based on our recent experiences.
Throughout this course, you will discover:
  • Introduction on actual Wi-Fi setups, standards, and common attacks

  • Monitoring and capturing signal over-the-air,
  • Analyzing the signal,
  • Using the right tools at the right moment,
  • Attacking communications (injection, cracking, etc.)
Attacks in WEP, WPA/WPA2,
  • Study the case of WPA3,

  • The case of open networks,
rogue AP,
  •  Stack protocol vulnerabilities,

  • Red Team tricks,
  • etc.

Requirements

  • Basics skills with Linux command lines
  • A Raspberry Pi 4
  • Optionally a computer with Linux to perform attacks with a faster computer
  • Wi-Fi dongle of choice: Alfa AWUS036ACH (a/b/g/n/ac), or Alfa AWUS036ACM (a/b/g/n/ac), or Alfa AWUS036AXML (a/b/g/n/ac/ax) for 2.4 GHz – 6GHz bands

You don't find what you are looking for?

Created with