Packtpub: BackTrack 5 Wireless Penetration Testing Video Curso
Descripcion:
Este curso está dirigido a profesionales de la seguridad y profesionales de TI que desean aprender acerca de las pruebas de penetración inalámbrica mediante la distribución de seguridad BackTrack Linux. El curso asume que usted ya conoce los conceptos básicos de las redes inalámbricas y puede operar por lo menos una distribución de Linux
Lo que va a aprender de este curso de vídeo
Romper el protocolo WEP, WPA, WPA2, WPS, redes inalámbricas basadas EAP / Radio
Creación de un laboratorio de la práctica para realizar pruebas de penetración inalámbrica
Olfatear y analizar paquetes inalámbricos del aire
Penetrar en redes inalámbricas basadas en las versiones empresariales de WPA y WPA2
Atacar la infraestructura WLAN sí mismo utilizando los ataques de denegación de servicio, puntos de acceso falsos, y otras técnicas
Contenido:
Introduction 2:31 minutes
Course Overview
Getting Started 12:35 minutes
Requirements for Setting Up Your Wireless Lab
Setting Up BackTrack (Download and Installation)
Setting Up Your Wireless Access Points (APs) and Clients
Wireless Networks - Rewards and Risks 30:47 mins
WLAN Theory Essentials
An Introduction to Wireless Frames
An Introduction to aircrack-ng
Capturing and Deciphering Wireless Frames
WLAN Authentication - Getting Past Invisible Barriers 24:31 mins
An Introduction to Wireless Authentication Protocols
Revealing Hidden SSIDs
Getting Past Open Authentication by Defeating MAC Filters
Bypassing Shared Key Authentication (SKA)
Sound [25:07 mins]
Exploiting WLAN Encryption Flaws
An Introduction to Wireless Encryption Protocols
Cracking WEP Encryption
Cracking WPA/WPA2 Pre-shared Keys
Connecting to Compromised Networks
WLAN Infrastructure - Threats and Countermeasures 18:18 mins
Exploiting Default Credentials
Denial-of-service (DoS) Attacks
Attacking WPS
Evil Twin Attack and Honeypots
Advanced Client-based WiFi Attacks 19:20 mins
An Introduction to Client-based Attacks
Attacking Clients using Honeypots
Hands-on Demonstration: Caffé Latte Attack
Hands-on Demonstration: Hirte Attack
Cracking WPA Without an AP
WLAN Security - Taking it One Step Further 20:35 mins
An Introduction to Man-in-the-middle (MITM) Attacks
Essential Steps: Wireless MITM Attacks
Eavesdropping and Session Hijacking
Detecting Client Security Settings
Enterprise Wireless Hacking 17:18 mins
Setting up FreeRADIUS-WPE
Hands-on Demonstration: Cracking PEAP
Hands-on Demonstration: Cracking EAP-TTLS
Security Best Practices for Enterprise WLANs
WLAN Penetration Testing - Doing It Effectively 8:43 mins
WLAN Penetration Testing: Doing It Effectively
Course Conclusion