This course is all about owning Wi-Fi networks and technologies. In the past few years we’ve released tools such as Snoopy and MANA, that look at how wireless networks are being used and how they can be exploited.
Course outline
What’s your Wi-Fi password?
This course is all about owning Wi-Fi networks and technologies. In the past few years we’ve released tools such as Snoopy and MANA, that look at how wireless networks are being used and how they can be exploited.
Breaking the air
Over two days, you’ll learn the basics of Wi-Fi and attack scenarios and delve right into breaking and exploiting WEP/WPA/WPA PSK in many real-world situations, such as coffee shops and corporate environments. From detecting wireless users and probe requests, to targeted wireless attacks against specific users or infrastructure, this course covers all attack angles.
Rogue Access Points
We presented several improvements in Wi-Fi rogue access point attacks. This module looks at those improvements to current attack tools and gets you into the mindset of owning users and networks.
Cyber-Defense Training Portal
We’ve developed a training portal for students to interact with the trainers, keep updated on content and also download all files, slides and tools delivered during the course. This portal is made available to all students, even when the course has finished. In addition, we’ve moved our training infrastructure into our own cloud, which means students get their own individual environments to test against, making use of VPN’s and numerous targets. This gives a fully immersive experience of attacking real-world architecture and networks.
Location & Time
Will be discussed
Our courses are delivered publicly by our training partner Gitex africa. For further information on the next public course. If you wish to have In-house training, please get in touch with our sales team to discuss further.
During this course, the student learns how applications are built, how vulnerabilities are introduced into the development process, and finally, we study the 10 most dangerous flaws according to OWASP.