UsefulLinks
Computer Science
Cybersecurity
Wireless Network Penetration Testing
1. Introduction to Wireless Penetration Testing
2. Wireless Networking Fundamentals
3. Wireless Security Mechanisms
4. Laboratory Setup and Tools
5. Reconnaissance and Information Gathering
6. Attack Methodologies
7. Client-Side and Advanced Attacks
8. Post-Exploitation Activities
9. Denial of Service Attacks
10. Defense Evasion Techniques
11. Defensive Countermeasures
12. Specialized Wireless Protocols
13. Documentation and Reporting
3.
Wireless Security Mechanisms
3.1.
Authentication Methods
3.1.1.
Open System Authentication
3.1.2.
Shared Key Authentication
3.1.3.
Pre-Shared Key (PSK)
3.1.4.
Enterprise Authentication
3.1.4.1.
802.1X Framework
3.1.4.2.
RADIUS Integration
3.1.4.3.
EAP Methods
3.2.
Encryption Protocols
3.2.1.
Wired Equivalent Privacy (WEP)
3.2.1.1.
RC4 Stream Cipher
3.2.1.2.
Initialization Vectors
3.2.1.3.
Known Vulnerabilities
3.2.2.
Wi-Fi Protected Access (WPA)
3.2.2.1.
Temporal Key Integrity Protocol (TKIP)
3.2.2.2.
Message Integrity Check
3.2.3.
Wi-Fi Protected Access 2 (WPA2)
3.2.3.1.
Advanced Encryption Standard (AES)
3.2.3.2.
Counter Mode with CBC-MAC Protocol (CCMP)
3.2.4.
Wi-Fi Protected Access 3 (WPA3)
3.2.4.1.
Simultaneous Authentication of Equals (SAE)
3.2.4.2.
Enhanced Open
3.2.4.3.
Protected Management Frames
3.3.
Wi-Fi Protected Setup (WPS)
3.3.1.
PIN Method
3.3.2.
Push Button Configuration
3.3.3.
Near Field Communication
3.3.4.
Security Vulnerabilities
3.4.
Enterprise Security Features
3.4.1.
Extensible Authentication Protocol (EAP)
3.4.1.1.
EAP-TLS
3.4.1.2.
EAP-TTLS
3.4.1.3.
PEAP
3.4.1.4.
EAP-FAST
3.4.2.
RADIUS Authentication
3.4.3.
Certificate-Based Authentication
3.4.4.
Dynamic Key Management
Previous
2. Wireless Networking Fundamentals
Go to top
Next
4. Laboratory Setup and Tools