Like other Offensive Security courses, WiFu combines traditional course materials with hands-on practice within a virtual lab environment. The course covers the following topics in detail. View the full syllabus.
- IEEE 802.11
- Wireless Networks
- Packets and Network Interaction
- Linux Wireless Stack and Drivers
- Aircrack-ng Essentials
- Cracking WEP with Connected Clients
- Cracking WEP via a Client
- Cracking Clientless WEP Networks
- Bypassing WEP Shared Key Authentication
- Cracking WPA/WPA2 PSK with Aircrack-ng
- Cracking WPA with JTR and Aircrack-ng
- Cracking WPA with coWPAtty
- Cracking WPA with Pyrit
- Additional Aircrack-ng Tools
- Wireless Reconnaissance
- Rogue Access Points
Learning Objectives
- Greater insight into wireless offensive security and expanded awareness of the need for real-world security solutions
- Implementing attacks against WEP and WPA encrypted network
- Executing advanced attacks such as PRGA key extraction and one-way packet injection
- Using alternate WEP and WPA cracking techniques
- Using various wireless reconnaissance tools
- Understanding of how to implement different rogue access point attacks
- Familiarity with the BackTrack wireless tools
Framework Connections
Specialty Areas
- Cyber Investigation
- Digital Forensics
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.