Understand the basics on how to conduct 802.11 survey, collection, encryption cracking, and conduct a wireless penetration test.
The hands on and lecture portions expose students to survey, collection, and attack methods used to gain a foothold into a network during a penetration test.
Target audience:
Security beginners or sys admins that would like exposure to basic wireless assessment techniques
Recommended Equipment and Pre-Reqs
Alpha Wireless Cards (SOME may be available from instructor to lend out)
Laptop with Kali Linux virtual machine
Students should be familiar with manipulating networking interfaces from the command line as well as other command line functionality.During this workshop attendees will get guidance and practical experience with handling a security incident. Our objective is to confront the students with a real-world scenario and provide them with questions that they need to solve but also with guidance on how to solve these questions. Virtual machines will be provided to each student so that they can practice on their own pace and take these home to continue after the workshop. Two instructors will assist the attendees and demonstrate a typical solution at the end of the workshop.
The malware’s execution needs to be stopped within the 4 hour limit, else all files will have been encrypted and deleted from the workstation.
During the workshop, attendees will be required to provide responses to management and work in teams of 2 people.
Attendees laptop requirements: