Network Security and Vulnerability Exploitation

  1. Wireless Network Security and Exploitation
    1. Wireless Networking Fundamentals
      1. Radio Frequency Basics
        1. Wireless Standards
          1. 802.11 Legacy
            1. 802.11a
              1. 802.11b
                1. 802.11g
                  1. 802.11n
                    1. 802.11ac
                      1. 802.11ax
                      2. Wireless Network Components
                        1. Access Points
                          1. Wireless Controllers
                            1. Antennas
                            2. Wireless Network Topologies
                              1. Infrastructure Mode
                                1. Ad-hoc Mode
                                  1. Mesh Networks
                                2. Wireless Security Protocols
                                  1. Wired Equivalent Privacy
                                    1. WEP Encryption
                                      1. WEP Weaknesses
                                      2. Wi-Fi Protected Access
                                        1. WPA Implementation
                                          1. TKIP Protocol
                                          2. WPA2
                                            1. AES-CCMP
                                              1. Pre-shared Key Mode
                                                1. Enterprise Mode
                                                2. WPA3
                                                  1. Simultaneous Authentication of Equals
                                                    1. Enhanced Open
                                                      1. Easy Connect
                                                      2. 802.1X Authentication
                                                        1. EAP Methods
                                                          1. RADIUS Integration
                                                        2. Wireless Attack Techniques
                                                          1. Wireless Reconnaissance
                                                            1. Passive Scanning
                                                              1. Active Scanning
                                                                1. Wardriving
                                                                  1. Wireless Site Surveys
                                                                  2. Wireless Encryption Attacks
                                                                    1. WEP Cracking
                                                                      1. FMS Attack
                                                                        1. KoreK Attack
                                                                          1. PTW Attack
                                                                          2. WPA/WPA2 Attacks
                                                                            1. Handshake Capture
                                                                              1. Dictionary Attacks
                                                                                1. Brute Force Attacks
                                                                                  1. PMKID Attack
                                                                                2. Wireless Infrastructure Attacks
                                                                                  1. Rogue Access Points
                                                                                    1. Evil Twin Attacks
                                                                                      1. Captive Portal Attacks
                                                                                        1. Karma Attacks
                                                                                        2. Wireless Client Attacks
                                                                                          1. Deauthentication Attacks
                                                                                            1. Disassociation Attacks
                                                                                              1. Client Isolation Bypass
                                                                                              2. Wireless Denial of Service
                                                                                                1. RF Jamming
                                                                                                  1. Protocol-based DoS
                                                                                                2. Bluetooth Security
                                                                                                  1. Bluetooth Architecture
                                                                                                    1. Bluetooth Security Modes
                                                                                                      1. Bluetooth Attacks
                                                                                                        1. Bluejacking
                                                                                                          1. Bluesnarfing
                                                                                                            1. Bluebugging