A Short Note on Wireless Hacking Techniques?

WE all know that Wi-Fi is most used technology at homes/offices todays, it is secured by password and some time open. when you walk in coffee shops and malls, you’ll  find lots of WiFi access point available without password protected, usually we connect with them without knowing risk. In another hand, if we talk about home Wifi then most of us have WiFi at home, but don’t know about its security. Hackers can connect with your WiFi and not only steal your bandwidth and also steal your important information transmit  over network.

Keep in mind the security of wireless Network we are going to show demonstration on Wireless Hacking and Security in Workshop. I will teach participants how the can hack secure wireless network. We focus only on ethical work. So “learn as a hacker and use skills as Security Researcher” 

Who can participate?

A person that loves technology

  1. The person that have zeal to learn some new things 
  2. Students that do study in B.Tech./M.Tech./BCA/MCA/B.Sc./M.Sc. or other technical courses.
  3. The person that use wireless network at office/home must know about the weakness, security and risk.
  4. The person that have ethics to use skill for creation not for destruction. 
  5. A non technical person that have passion to learn wireless hacking skills and improve it.
  6. The person who want to see himself secure in wireless network, must be attained. 

Wireless Hacking Techniques Highlights

Workshop Name :             Workshop on Wireless Hacking Techniques 


Course Duration :             2 Days (16 Hours )


Certification :                     Certificate of Completion by Cyber Pratibha 


Study Material :                 E-book, LAB Manual & Reference Guide


Software Kit :                      All Required tools inside DVD


Practical  :                           Participant will do practical along with trainer (on his laptop)


Wireless Hacking Techniques Workshop Course Content

Wireless Hacking Techniques – Course Content

  1.  What you should expect from this Workshop
  2. Standard of Wireless Security IEEE 802.11
  3. Types of Wireless Network Add-Hoc and Infrastructure
  4. Management Frames
    1. Beacon
    2. Authentication
    3. Association and Reassociation
    4. Response
    5. Disassociation and deauthentication
    6. Action frames
  5. Preparing Lab For attack
    1. Create Live DVD of Kali Linux
    2. Check working of Wireless Adapter
  1. Interacting with Network
    1. Probe
    2. Authentication
    3. Association
    4. Encryption
  2. Enable the monitoring mode to see available network around us!
    1.  Uses of Airmon-ng
  3. Getting started with Aireplay-ng tool
  4. Discount all connecting clients for Access point by deauth attack.
  5. Find out Hidden Access point name.
  6. Create a Fake Access Point
  1.  Wireless Security types (Open/WEP/WPS/WPA/WPA2)
  2. Usage of Airodum-ng tool
  3. Cracking WEP by using Aircrack-ng suits
    1. Aireplay Attack 0 : Deauthentication
    2. Aireplay Attack 1 : Fake Authentication
    3. Aireplay Attack 2 : Interactive packet Replay
    4. Aireplay Attack 3 : ARP request Replay Attack
    5. Aireplay Attack 4 : Koreok chopchop Attack
    6. Aireplay Attack 5 : Fragmentation Attack
    7. Aireplay Attack 9 : Injection Test
  4. Cracking WPS
  5. Cracking WPA/WPA2
  6. Other Wireless cracking tools in Kali Linux
  1. Associated with AP by Using cracked key
  2. What hackers can do with you after associating
  3. What is MITM and why you need it?
  4. What is ARP and ARP poisoning?
  5. Start MITM attack using Ettercap
  1. Get password and Data from Wireless network.
  1. What is the Secure Layer
  2. How hackers capture victim’s password from Secure Layer
  3. Hands on SSL strip attack.
  1. What is phishing or Cloning website.
  2. Trap victim for passwords.
  3. DNS spoofing and get passwords
  1. Tips to Secure wireless Network

Recommendation

bring laptop with you 

It is strongly recommended to bring your own LAPTOP during the training so that you can easily practice the exercises at home.

Ethical Hacking Workshop's Feature

EXPERTS FOR WORKSHOP

Workshop will be delivered by experts with friendly behavior. So student can ask anything any time.

WORKSHOPS IN COLLEGE

We are going to conduct workshop in College/University, So most of student engage in such type of programs. 

PRACTICAL BY PARTICIPANTS

Participants can use own laptop for practical, so they will understand better and DO practice more. 

LIVE DEMONSTRATION

Most beautiful part is live demo, It will increase interest of participants to interact with trainer

For More information Get in Touch

WORKSHOP FAQ

Q.: Who can attend seminar and workshop?             

A.: Everyone, who has technical background or have interest to boos their career in IT Security.


Q.: I am student, can I organize workshop in my campus?             

A.: YES, You can organize workshop in your campus. You will get coordinator certificate too.


Q.: Who can organize workshop?                    

A.: Anyone, Who has ability to gather students for workshop, and take responsibility to make workshop success.


Q.: Where do you deliver workshops?                 

A.: We deliver workshops all over India


Q.: I never attend workshop, Can I subscribe newsletter?                      

A.: Yes you can subscribe our newsletter without any charge to instant update in your inbox.


Q.: What will the charge of workshop?                          

A.: It is confidential, you can ask to coordinator.


Scroll to top