• Online, Self-Paced
Course Description

Like other Offensive Security courses, WiFu combines traditional course materials with hands-on practice within a virtual lab environment. The course covers the following topics in detail. View the full syllabus.

  • IEEE 802.11
  • Wireless Networks
  • Packets and Network Interaction
  • Linux Wireless Stack and Drivers
  • Aircrack-ng Essentials
  • Cracking WEP with Connected Clients
  • Cracking WEP via a Client
  • Cracking Clientless WEP Networks
  • Bypassing WEP Shared Key Authentication
  • Cracking WPA/WPA2 PSK with Aircrack-ng
  • Cracking WPA with JTR and Aircrack-ng
  • Cracking WPA with coWPAtty
  • Cracking WPA with Pyrit
  • Additional Aircrack-ng Tools
  • Wireless Reconnaissance
  • Rogue Access Points

Learning Objectives

  • Greater insight into wireless offensive security and expanded awareness of the need for real-world security solutions
  • Implementing attacks against WEP and WPA encrypted network
  • Executing advanced attacks such as PRGA key extraction and one-way packet injection
  • Using alternate WEP and WPA cracking techniques
  • Using various wireless reconnaissance tools
  • Understanding of how to implement different rogue access point attacks
  • Familiarity with the BackTrack wireless tools

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.