2020-09-02, 16:00–19:00, Workshops stream
Wireless Networks are the most used type of network, most people don’t know really how vulnerable they are. In this workshop we will cover most encryptions used today, how they work and step by step hacking exercises. You will be able to apply this knowledge on real-life-scenario wifis
It this workshop we will teach the cryptographic theory behind WIFI encryption and their flaws. We’ll have prepared 7 routers with different vulnerabilities for you to hack them all!
What to expect:
- 40% theory
- 60% practice/attacks
What to know before?
- Linux commands (sed, awk, grep and the basic ones)
- Basic shell scripting
- Basic knowledge about WEP/WPA/WPA2/WPS
- What are you going to do specifically?
- Infrastructure attacks
- WPS. Pin brute force and pixie attack.
- WEP. Easy hacking!
- WPA/WPA2. 4 Way handshake KRACK Attack PMKID attack (clientless). Intercepting and decrypting traffic from hacked networks.
- Cracking passwords using GPUHash (gpuhash.com) and AWS.
- Client attacks.
- Caffe Latte
- Hirte
- Evil Twin
- MITM
- DoS (deauth & disassociation)
- DNS hijacking
- Fake AP Floods
What tools are we going to use?
- aircrack-ng (ifconfig, iwconfig, airmon-ng, airodump-ng, aireplay-ng, aircrack-ng, airbase-ng, airdecap-ng)
- Reaver (reaver, wash)
- Pyrit
- tshark/Wireshark/tcpdump
- Ettercap
What to read in advance
- Vivek Ramachandran & Cameron Buchanan, 2015, Kali Linux Wireless Penetration Testing Beginner’s Guide, Birmingham B3 2PB, United Kingdom.
STUDENT REQUIREMENTS
- Is better for the attendees to have a test router and an alpha adapter (also a Kali VM) for the class.
You can purchase tickets here: https://nonamecon.2event.com/