“If I had eight hours to chop down a tree, I’d spend six hours sharpening my axe.”
Abraham Lincoln
Simple..
Wireless Networks have become ubiquitous in today’s world. Even tough wireless makes life incredibly easy and gives us such great mobility, it comes with risks. In recent times, insecure wireless network have been used to break into companies, banks and geoverment organizations. If your network administrators are still clueless, hackers comes for you. I wanna explain step-by-step every wireless attack in this series.
Chapter 1, Lab Setup: There are dozens of attacks we will a doing in this series. In order to be able to try them out, the reader will need to setup a lab. This chapter focuses on how to create a wireless testing lab using self hardware.
Chapter 2, WLAN and its Inherent Insecurities: This chapter focuses on inherent design flaw in wireless networks. We will being with a quick recap of the 802.11 WLAN protocols using a network analyzer called Wireshark. This will give us a practical understanding about how these protocols work. Then, we will learn about packet injection and packet sniffing in wireless networks and look at some tools which enable us to do the same.
Chapter 3, Bypassing WLAN Authentication: We will go step by step and explore how to subvert Open and Shared Key authentications. We will also look at how to break into networks with Hidden SSID and MAC Filtering enabled. These are two common mechanisms employed by network administrators to make wireless networks more stealthy and difficult to penetrate; however, these are extremely simple to bypass.
Chapter 4, WLAN Encryption Flaws: One of the most vulnerable parts of the WLAN protocol is the Encryption schemas – WEP, WPA and WPA2. We will understand the insecurities in each of these encryption schemas and do practical demos on how to break them.
Chapter 5, Attacks on the WLAN Infrastructure: We will look at vulnerabilities created due to both configuration and design problem. We will do practical demos of attacks such as access point MAC spoofing, bit flipping and replay attacks, rogue access points, fuzzing and denial of services.
Chapter 6, Attacking the Client: We will look at how to compromise the security using client side attacks such as Miss-Association, Caffe Latte, disassociation, ad-hoc connections, fuzzing, honeypots and a host of others.
Chapter 7, Advanced WLAN Attacks:
Behind every successful execution is hours or days of preparation, and wireless penetration testing is no exception. In this article, we will take a look at Installing the wireless card and testing connectivity between the laptop and the access point. So let the games begin!
Chapter 8, WLAN Penetrating Testing Methodology: This is where all the learning from the previous chapters comes together, and we will look at how to do a wireless penetration test in a systematic and methodical way. We will learn about the various phases of penetration testing—Planning, Discovery, Attack and Reporting, and apply it to wireless penetration testing. We will also understand how to propose recommendations and best practices after a wireless penetration test.
İlk Yorumu Siz Yapın