Ultimate Hacking: Wireless

Foundstone | August 2-3


On This Page


Overview

Mission-critical data, secrets and other company information transmitted into the air cause hackers everywhere to rejoice!

Wireless networks bring unique challenges to those tasked with their defense. How confident are you that your wireless infrastructure can withstand the latest attacks by the world's cleverest hackers? Beyond the authorized wireless infrastructure you know exists in your organization, what about the wireless networks that aren't supposed to be there?

Foundstone's internationally renowned, "Ultimate Hacking: Hands On" series goes wireless to help you see your wireless networks the way hackers see them. Learn the tools, techniques and methods attackers use against you in order to develop an effective defense against their increasingly sophisticated onslaught.

Ultimate Hacking: Wireless is a lab-driven class walking students through the following:

IEEE 802.11

• Intro to basic Linux 802.11 wireless configuration
• Fundamentals of 802.11 (PHY, channels, framing, session establishment, and security)
• 802.11 Toolkit (Attack hardware and software)
• Launching Basic Attacks (Discovery, Sniffing, Fake AP, MAC spoofing, Captive Portals, and DoS)
• Understanding and Attacking WEP (Encryption/Decryption, Manual/Automated WEP Cracking)
• Understanding and Attacking WPA (WPA-PSK, WPA-Enterprise, 4-way handshake, IEEE 802.1x, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, EAP-MD5, and LEAP)

BlueTooth

• Intro to Bluetooth (PHY, channels, rates, architecture)
• Bluetooth Authentication and Encryption
• Bluetooth Hacking Toolkit
• Discovering and Attacking Bluetooth

RFID

• Intro to RFID technologies (125 kHz, 900 MHz, 13.56 MHz)
• Common use and implementations (NFC, Inventory, HID and Mifare access, toll roads)
• RFID Hacking Toolkit
• Cloning (HID ProxCard, iClass, MiFare)

Zigbee/Z-Wave

• Intro to low power wireless Zigbee and Z-Wave
• The use of these technologies in the Internet of Things
• Security risks inherent in each (Rogue devices, sniffing, clear text network keys, DoS)
• Custom hacking hardware


Who Should Take This Course

Anyone responsible for the planning, implementation, maintenance, or assessment of wireless networks.


Student Requirements

General networking skills are required to get the full benefit of the course.


What Students Should Bring

Nothing to bring. All necessary equipment will be provided including preconfigured workstations, tools and utilities.


What Students Will Be Provided With

Foundstone provides everything you will need to maximize your learning experience (e.g. laptops, targets, course materials). All you need to bring is the desire to learn! Added Bonus! You get to take home the tools you use during class as below! A customized Live Linux distribution installed on a USB thumb drive for maximum portability, increased speed, and laptop battery life, your notes, live capture files, and anything else you put on the USB drive during class! Foundstone T-shirt and pen.


Trainers

Brad Antoniewicz works as part of Foundstone's research division. He's the contributing author to Hacking Exposed and Hacking Exposed: Wireless, and has authored various whitepapers, tools and methodologies.