When it comes to assessing the security of wireless networks, the aircrack-ng suite of tools may be one of the most useful tools on which you can rely. Jerod discusses the different types of security configurations most often applied to wireless networks, and he introduces a step-by-step process you can follow to both identify and attack clients on those networks.
- [Instructor] Aircrack-ng is actually a suite of tools…designed to test the security of wireless networks.…I've used the Aircrack-ng suite on virtually…every penetration test I've performed…where wireless was installed.…In order to use this tool, you want to connect…another wireless network adapter to your machine.…I've used Alfa wireless network adapters for years…since the Realtek chipset makes it easy for kali…to recognize the adapter without a lot of extra steps.…
This suite of tools can help you quickly identify…the wireless encryption settings…in use on any target wireless networks.…If a network is open, that means…the wireless network traffic is unencrypted.…Encrypted networks like WEP, WPA and WPA2…can all be potentially cracked using Aircrack-ng.…When using these tools, the first step is to run airmon-ng…to start a virtual wireless network adapter.…
Similar to wireshark, this adapter will enable you…to capture wireless traffic on your machine.…This virtual adapter needs to be installed and running…before any of the other steps will work.…
Note: This course aligns with the National Institute of Standards and Technology (NIST) special publication on information security testing (SP 800-115).
- Identifying the five major types of security assessments
- Defining the security assessment life cycle
- Setting up your testing environment
- Planning a security assessment
- Reviewing documentation, logs, and more
- Identifying test targets
- Testing for password and other security vulnerabilities
- Drafting and delivering your report
Skill Level Beginner
Security Testing: Nmap Security Scanningwith Mike Chapple1h 46m Intermediate
Troubleshooting Your Network with Wiresharkwith Lisa Bock2h 35m Intermediate
DevSecOps: Automated Security Testingwith James Wickett1h 35m Intermediate
What you should know1m 49s
1. Understanding Security Assessments
2. Your Testing Environment
3. Planning Your Assessment
4. Review Techniques
5. Identifying Your Targets
6. Vulnerability Validation
7. Additional Considerations
Next steps3m 39s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.