New Skills

New Training: Wireless and Mobile Device Attacks and Tools

by Team Nuggets
New Training: Physical Penetration Testing picture: A
Follow us
Published on February 25, 2021

In this 8-video skill, CBT Nuggets trainer Bob Salmans discusses wireless and mobile device attacks and the tools used to carry them out. He’ll also walk through multiple wireless attacks and show how they are executed. Watch this new CompTIA training.

Learn CompTIA with one of these courses:

This training includes:

  • 8 videos

  • 50 minutes of training

You’ll learn these topics in this skill:

  • Wireless and Mobile Device Attacks and Tools

  • Sniffing Wireless Data

  • Wireless Analysis With Kismet

  • Wireless Deauthentication Attacks

  • Cracking WPA2 Preshared Keys

  • Wireless Evil Twin Attack

  • Automated Wifi Attack Tools

  • Section Review

4 Most Common Wireless Attacks

Although hacking heavily leverages innovation and creativity, certain attacks are used more commonly than others. Knowing which tactics you'll most likely encounter is foundational to defending against them.

Rogue Wireless Devices: This is an unauthorized device that isn't under the management of network admins. If a hacker can add one to a network, it opens a gateway to the network.

Peer-to-Peer Attack: Devices connected to the same access point can interact with each other unless that function has been disabled by the provider.

Eavesdropping: There are two types of eavesdropping. The first is casual eavesdropping, where a wireless client actively scans in search of wireless access points. Although this is common and not necessarily malicious, it can still result in data compromise. The second is malicious eavesdropping, which occurs whenever someone intentionally attempts to intercept someone else's data stream.

Wireless Hijacking: A hacker can configure his laptop to broadcast a signal as a wireless access point by using the same SSID as a legitimate public hotspot. When someone connects to the signal, they're open to monitoring or peer-to-peer attacks.


Download

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.


Don't miss out!Get great content
delivered to your inbox.

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522