JUSTIFICATION AND OVERVIEW:
In the world of Internet of Things (IoT), Wi-Fi connected doorbells, and smart TV’s and Robot vacuum cleaners, the necessity to understand and manipulate the communication has never been more apparent.
Wi-Fi networks can be strategically utilised to gather actionable intelligence and patten of life and can facilitate undetected entry (by compromising DVRs and IP Cameras) or gain insights into mobile devices and IT systems, thereby enabling the coordination of subsequent operations.
Wi-Fi exploitation plays a pivotal role in enhancing the various stages of the operational cycle, encompassing intelligence gathering, offensive strategies, and further exploitation.
By completing this course, participants will acquire the skills to:
• Comprehensively understand Wi-Fi from both offensive and defensive standpoints, leveraging it as a channel for executing attacks and conducting exploits;
• Facilitate access to systems and generate intelligence;
• Disable, disrupt or deny the functionality of devices, networks, and actions with the aim of directing or signaling activities or achieving isolated impacts.
This course covers the latest in technology from Wi-Fi 7 to working in Bustling urban environments and some of the tradecraft around conducting operations.
BOTTOM LINE UP FRONT:
This course educates students on how to capitalise on the vulnerabilities present within Wi-Fi networks, enabling them to intercept data, deny or disrupt capabilities, and/or facilitate undetected access to premises and assets.
CONDITIONS OF ENTRY:
Students are not required to have any specific experience before participating in this course. A strong technical aptitude and the completion of other courses CCA series are strongly recommended or equivalent training, will lay a robust groundwork for this course.
INDICATIVE COURSE CONTENT:
Setup of environment
• What is a virtual machine?
• Why do we use them?
• Installing and navigating the Operating System?
• Configuring for Wi-Fi Hacking.
Wi-Fi Overview
• What is Wi-Fi?
• What makes Wi-Fi special are vulnerabilities and access methods.
• Wi-Fi 6 and 7 issues and vulnerabilities.
• Legal considerations.
Identifying the target
• War Driving, identifying networks.
• Building a data set.
• Multiple location tracking.
• Adding GPS data to a scan
• OSINT enhancement of reconnaissance findings.
• Identifying Targets with MAC randomisation.
Attacking Wi-Fi
• Jamming
• Targeted de-authentication
• Fake Access points
• Small form factor Wi-Fi Devices
• Man in the Middle Attacks
• Wi-Fi Intercept
• Password Cracking
Lab and Real-world scenarios
• Identify
• Attack
• Practice
• COTS Wi-Fi adaptation
top of page
$9,800.00Price
bottom of page