Like other Offensive Security courses, WI Fu combines traditional course materials with hands-on practice within a virtual lab environment. The course covers the following topics in detail. View the full syllabus.
- IEEE 802.11
- Wireless Networks
- Packets and Network Interaction
- Linux Wireless Stack and Drivers
- Aircrack-ng Essentials
- Cracking WEP with Connected Clients
- Cracking WEP via a Client
- Cracking Clientless WEP Networks
- Bypassing WEP Shared Key Authentication
- Cracking WPA/WPA2 PSK with Aircrack-ng
- Cracking WPA with JTR and Aircrack-ng
- Cracking WPA with coWPAtty
- Cracking WPA with Pyrit
- Additional Aircrack-ng Tools
- Wireless Reconnaissance
- Rogue Access Points
Learning Objectives
- Greater insight into wireless offensive security and expanded awareness of the need for real-world security solutions
- Implementing attacks against WEP and WPA encrypted network
- Executing advanced attacks such as PRGA key extraction and one-way packet injection
- Using alternate WEP and WPA cracking techniques
- Using various wireless reconnaissance tools
- Understanding of how to implement different rogue access point attacks
- Familiarity with the BackTrack wireless tools
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.