0% found this document useful (0 votes)
689 views1 page

Wireless Penetration Testing Flowchart

http://wirelesslanprofessionals.com/wireless-lan-penetration-testing-course/ “Wireless LAN Security Assessment Toolkit” – and it was a course than not only taught wireless hacking, but also came with all the parts one might have needed. Spectrum Analyzers, 5 WLAN NICs, access points, hand-held client devices, and all the software pre-configured, and finally, even a laptop to run it all on. Below is PDFs of the printed student materials included in the Wireless LAN Security Assessment Toolkit course. Yes, these are a couple of years out of date… but many of the concepts and techniques used are still valid today.

Uploaded by

Chris Muncy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
689 views1 page

Wireless Penetration Testing Flowchart

http://wirelesslanprofessionals.com/wireless-lan-penetration-testing-course/ “Wireless LAN Security Assessment Toolkit” – and it was a course than not only taught wireless hacking, but also came with all the parts one might have needed. Spectrum Analyzers, 5 WLAN NICs, access points, hand-held client devices, and all the software pre-configured, and finally, even a laptop to run it all on. Below is PDFs of the printed student materials included in the Wireless LAN Security Assessment Toolkit course. Yes, these are a couple of years out of date… but many of the concepts and techniques used are still valid today.

Uploaded by

Chris Muncy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Wireless Penetration Test

Discover, Locate and Access


Interview Customer
RF Signature Analysis Scan for networks using directional antennas Physically locate AP based upon signal strength Bluetooth Scanning
Define scope of work
WiSpy Spectrum Analyzer AirDefense Bluescanner
Customer signs off on testing
WiFiHopper

Sniffing and Capturing Data

Capture and Analyze VoIP traffic Capture Email Passwords Capture and Analyze Web Email Traffic Capture and Analyze Web Site Traffic

Clearsight Winsiffer Netresident Driftnet

Etherape
Cracking 802.11 Encryption and
Authentication on Protected Networks

LEAP Cracking WPA-PSK Dictionary Attack WEP cracking and decrypting WEP traffic WEP Cracking Acceleration Tools

Rogue Access Points and Client Hacking

Client Hijacking / Evil Twin AP Fake Hotspot Piggybacking on a captive portal

Zyxel Soft AP Linux Script Linux Script

Create a captive portal using DD-WRT

Denial of Service

Narrowband RF Jamming Wideband RF Jamming Queensland Attack Deauth 802.11 Associate / Authentication Flood

2.4 GHz video camera Prism Test Utility Linux Script

Document and write report of findings CommView


Creative Advanced Attacks
Present wireless security assessment report AirDefense Air terminate
to customer

You might also like