Wireless Network Penetration Testing Training
Introduction to Wireless Network
- Wireless Technologies
- Definitions
- Frame, Beacon, Station, SSID, BSSID, Kanal numaraları, Authentication, Association, WEP, WPA, EAP, TKIP, WPA2
- Wireless Network Types
- Wireless LAN (802.11 family) Standards
- Linux / Windows operating system with wireless networking
- The discovery of WiFi networks in the environment
- WEP is used to connect to the network
- Used to connect to WPA network
- Authentication types on wireless networks
- Open Authentication
- Shared Authentication
- Encryption in the wireless network Association and Concepts
Discovery in Wireless Networks
- Wireless network interface operating modes
- Monitor mod
- Managed mod
- Master mod
- Discovery Methods and Types
- Active Discovery Methods
- Monitor connected to a WLAN client
- The Media API (Access Point) tracking
- Passive Discovery Methods
- Hidden networks (Hidden SSID) elicitation
- Finding WiFi networked clients
- Finding the MAC and IP addresses to network clients
- Reading the properties of WiFi devices in the environment
- Discovery Tools
- NetStumbler
- Kismet
- Wireshark
- Airtraf
- RF signal measurement tools
- Wardriving, WarChalking Tanımları
Wireless Network Security Weaknesses
- Wireless network security vulnerabilities are
- Hidden ssıd'l AP (AccessPoint) The presence of s
- Sniffing the wireless network
- Channel set and monitor mode
- Mac Adresi Filtrelemelerini Aşma
- WEP Weaknesses
- AccessPoint management interface weakness
- In the wireless network TCP / IP spoofing güvenliğiarp
- IP Spoofing
- Frame spoofing
- Session information stealing attacks
WEP / WPA / WPA-II compromise
- WEP
- WEP key selection, IV, X and RC4 basics
- WEP The logic
- How does WEP encryption?
- How to solve the WEP encryption?
- Dynamic WEP Concept
- WEP and DWEP differences
- Reading with WEP encrypted traffic in Wireshark
- Infiltration methods used WEP network
- The discovery of WEP supported network
- FMS Attack method
- Korek method of attack
- WPA, WPA-II
- WPA operating logic
- WEP - WPA Differences
- TKIP HMAC PSK definitions
- Infiltration methods used to WPA network
- Availability of WPA-enabled network
- 4-way handshake packet capture their
- No password from handshake packets
- WPA Protokol Analizi
- Infiltration methods used to WPA network
- WPA-II network to infiltration methods used
Authentication Methods
- Extensible Authentication Protocol
- EAP/TLS, PEAP, PEAPv1, PEAPv2, TTLS, EAP-FAST, PEAP-EAP-TLS kimlik doğrulama çeşitleri.
- Radius to use for authentication
- 802.1x application with FreeRadius
- Windows authentication using IAS
DOS Attacks in Wireless Networks
- DOS attacks against 802.11 networks
- Physical DOS attacks
- Jamming Signal mixers
- DOS attacks used in cryptography network
- DOS attacks used in cryptography network
- Towards the DOS-type Wireless LAN
- DOS with Associations messages (flood) Create
- DOS, the authentication messages (flood) Create
- DOS with Dissociation message
- Create DOS with the message Deauthenticatio
- DOS araçları:void11, AirJack , file2air, aireplay-ng
Public Wireless Networks Hazards
- Abuse of access information with Wifizoo
- Active attacks with Karmasploit
- AccessPoint are fake
- Installation of fake AP
- The monitoring of users who connect to the fake AP
- The presence of fake APs & nmap and Nessus
- WiFi users with active attacks Karmasploit
- WiFi users directing traffic
- WiFi users to read the SSL traffic
WiFi Hotspot Tests
- Internet access free testing
- ICMP tunneling
- DNS tunneling
- Users can capture the account information depending on the environment
- HotSpot use MAC Address copy method
- Testing the router system Hotspot
- Hotspot tests of web applications
Aircrack-ng ile Wireless Pentest
- With the Wess-ng Usage Example
- In the example EACS-ng Usage
- Airtime to-ng Uses
- Airdecap-ng uses
- Using the example of Aircrack-ng
- Using the example Aireplay-ng
- Packetforg-ngu use with examples
- Airodump-ng use
Intrusion Detection System for Use in Wireless Network
- WIDS(Wireless Intrusion Detection Sytem) Tanımı
- WIPS(Wireless Intrusion Prevention Sytem) Tanımı
- Yöntelik attacks on wireless networks
- Interpretation of attacks by Widsa
- Using Kismet as Widsa
- To prevent attacks by WIPS