New Training: Wireless and Mobile Device Attacks and Tools

In this 8-video skill, CBT Nuggets trainer Bob Salmans discusses wireless and mobile device attacks and the tools used to carry them out. He’ll also walk through multiple wireless attacks and show how they are executed. Watch this new CompTIA training.
Learn CompTIA with one of these courses:
This training includes:
8 videos
50 minutes of training
You’ll learn these topics in this skill:
Wireless and Mobile Device Attacks and Tools
Sniffing Wireless Data
Wireless Analysis With Kismet
Wireless Deauthentication Attacks
Cracking WPA2 Preshared Keys
Wireless Evil Twin Attack
Automated Wifi Attack Tools
Section Review
4 Most Common Wireless Attacks
Although hacking heavily leverages innovation and creativity, certain attacks are used more commonly than others. Knowing which tactics you'll most likely encounter is foundational to defending against them.
Rogue Wireless Devices: This is an unauthorized device that isn't under the management of network admins. If a hacker can add one to a network, it opens a gateway to the network.
Peer-to-Peer Attack: Devices connected to the same access point can interact with each other unless that function has been disabled by the provider.
Eavesdropping: There are two types of eavesdropping. The first is casual eavesdropping, where a wireless client actively scans in search of wireless access points. Although this is common and not necessarily malicious, it can still result in data compromise. The second is malicious eavesdropping, which occurs whenever someone intentionally attempts to intercept someone else's data stream.
Wireless Hijacking: A hacker can configure his laptop to broadcast a signal as a wireless access point by using the same SSID as a legitimate public hotspot. When someone connects to the signal, they're open to monitoring or peer-to-peer attacks.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.