- دوره نهایی برای کشف حملات تهاجمی Wi-Fi مدرن و اندازه گیری های متقابل برای اهداف تیم قرمز و تیم آبی. این دوره شامل Wi-Fi 6E نیز می باشد. بسیاری از نشریات راه های حمله به شبکه های Wi-Fi را مستند می کنند. با این حال، شکاف بین روشهای قدیمی که منسوخ شدهاند و وضعیت فعلی و ابزارهای قدیمی میتواند برای کسی که میخواهد دانش خود را در این زمینه یاد بگیرد یا حتی به روز کند، ممکن است خستهکننده باشد.
هدف از این دوره آموزش روش های مدرن ارزیابی امنیت شبکه های Wi-Fi و نحوه اعمال این حملات علیه سازمان ها در طول تعامل با تیم قرمز است. در واقع، در طول این دوره، ما میتوانیم از همان ابتدا با صحبت در مورد حملات و فرصتهای قدیمی، فعلی و جدید شروع کنیم تا به شرکتکنندگان این امکان را بدهیم تا براساس تجربیات اخیر ما، تعهدات خود را در آینده انجام دهند.
لینک دانلود دوره آموزشی Penthertz – Red Team Wi-Fi
حجم: 5.7 گیگابایت
دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم
دانلود – بخش چهارم
دانلود – بخش پنجم
دانلود – بخش ششم
Airodump ng
Date: 2024
Price: $884
Publisher: Penthertz
Format: Video + File Setup
Website: Link
The ultimate course to uncover modern Wi-Fi offensive attacks and counter measurements for Red Team and Blue Team purposes. This course includes also Wi-Fi 6E. Many publications exist documenting ways to attack Wi-Fi networks. Still, the gap between old methods that have become obsolete and the current state and outdated tools can be frustrating for someone who wants to learn or even update his knowledge in this field.
This course aims to learn the modern ways of assessing the security of Wi-Fi networks and how to apply these attacks against organizations during a Red Team engagement. Indeed, during this course, we will be able to start from the very beginning by talking about old, current, and new attacks and opportunities to allow attendees to fulfill their pentest or Red Team engagements in the future based on our recent experiences.
Throughout this course, you will discover:
- Introduction on actual Wi-Fi setups, standards, and common attacks
- Monitoring and capturing signal over-the-air, Analyzing the signal,
- Using the right tools at the right moment,
- Attacking communications (injection, cracking, etc.)
Attacks in WEP, WPA/WPA2,
- Study the case of WPA3,
- The case of open networks, rogue AP,
- Stack protocol vulnerabilities,
- Red Team tricks,
- etc.
Requirements
- Basics skills with Linux command lines
- A Raspberry Pi 4
- Optionally a computer with Linux to perform attacks with a faster computer
- Wi-Fi dongle of choice: Alfa AWUS036ACH (a/b/g/n/ac), or Alfa AWUS036ACM (a/b/g/n/ac), or Alfa AWUS036AXML (a/b/g/n/ac/ax) for 2.4 GHz – 6GHz bands
01 Introduction
This part will introduce all the essential concepts of Wi-Fi. Indeed, starting with usages, topologies, and standards, attendees should have a well-condensed reminder to be able for the attacks later.
Setup 00:17
IEEE 802.11, uses cases, important 802.11 standards and amendments, the different layers 25:59
Wi-Fi 6/6E and Wi-Fi 7 03:43
Wireless networks (modes, infrastructures) + exercises 14:17
Listing capabilities correction 22:13
RF transmission, Wi-Fi cards, boosting transmission, and RF physical aspects 03:55
Linux kernel module, *MACs, patching 08:24
02 Network introspection
This part aims to be practical, using different techniques to identify the other network to focus on our target(s).
Network enumeration + exercises 01:43
Scanning 06:12
Capturing the traffic in promiscous mod 10:29
Monitoring and useful tools 07:54
Kismet 14:20
Airodump-ng 20:02
Manipulating packets with Scapy 27:04
Introspecting Wi-Fi 6/6E channels 03:30
Going low level on radio 06:58
03 Attacks and risks
After learning about monitoring, captures, and packet manipulations, we will see different cases and understand the opportunities an attacker can take when attacking a network. This part will go through old vulnerabilities that can still exist in some context to the newest attack opportunities, including recent tools.
Risks, security state of the art (open, WEP, WPA/WPA2 PSK and MGT, etc.), hotspot and evil-twin attacks + exercises 25:48
Further tools, IDS and scanning attacks 39:08
Attacks on WEP + exercises 08:45
Correction of WEP exercises 17:09
Attacks on WPA/WPA2 + exercises 11:02
Fixing issues on the exercise 01:06
Correction of the WPA2 PSK exercise 10:32
Further attacks on WPA2 PSK, powerful tools, attacks on WPA2 MGT + exercises 12:14
Correction + further techniques 19:12
EAP downgrade (old but could still happen…), relays, mitigations, WPS 03:57
Security and attacks against WPA3 + exercises 03:12
Other opportunistic attacks, vulnerability hunting 08:19
Last Red Teaming tricks 23:47
I really needed this course, please put other courses of this company for download
thanks for follow us