• Online, Self-Paced
Course Description

Like other Offensive Security courses, WiFu combines traditional course materials with hands-on practice within a virtual lab environment. The course covers the following topics in detail. View the full syllabus.

  • IEEE 802.11
  • Wireless Networks
  • Packets and Network Interaction
  • Linux Wireless Stack and Drivers
  • Aircrack-ng Essentials
  • Cracking WEP with Connected Clients
  • Cracking WEP via a Client
  • Cracking Clientless WEP Networks
  • Bypassing WEP Shared Key Authentication
  • Cracking WPA/WPA2 PSK with Aircrack-ng
  • Cracking WPA with JTR and Aircrack-ng
  • Cracking WPA with coWPAtty
  • Cracking WPA with Pyrit
  • Additional Aircrack-ng Tools
  • Wireless Reconnaissance
  • Rogue Access Points

Learning Objectives

  • Greater insight into wireless offensive security and expanded awareness of the need for real-world security solutions
  • Implementing attacks against WEP and WPA encrypted network
  • Executing advanced attacks such as PRGA key extraction and one-way packet injection
  • Using alternate WEP and WPA cracking techniques
  • Using various wireless reconnaissance tools
  • Understanding of how to implement different rogue access point attacks
  • Familiarity with the BackTrack wireless tools

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.