New Training: Wireless and Mobile Device Attacks and Tools
| new skills - Team Nuggets

New Training: Wireless and Mobile Device Attacks and Tools

In this 8-video skill, CBT Nuggets trainer Bob Salmans discusses wireless and mobile device attacks and the tools used to carry them out. He’ll also walk through multiple wireless attacks and show how they are executed. Watch this new CompTIA training.

Learn CompTIA with one of these courses:

This training includes:

  • 8 videos
  • 50 minutes of training

You’ll learn these topics in this skill:

  • Wireless and Mobile Device Attacks and Tools
  • Sniffing Wireless Data
  • Wireless Analysis With Kismet
  • Wireless Deauthentication Attacks
  • Cracking WPA2 Preshared Keys
  • Wireless Evil Twin Attack
  • Automated Wifi Attack Tools
  • Section Review

4 Most Common Wireless Attacks

Although hacking heavily leverages innovation and creativity, certain attacks are used more commonly than others. Knowing which tactics you'll most likely encounter is foundational to defending against them.

Rogue Wireless Devices: This is an unauthorized device that isn't under the management of network admins. If a hacker can add one to a network, it opens a gateway to the network.

Peer-to-Peer Attack: Devices connected to the same access point can interact with each other unless that function has been disabled by the provider.

Eavesdropping: There are two types of eavesdropping. The first is casual eavesdropping, where a wireless client actively scans in search of wireless access points. Although this is common and not necessarily malicious, it can still result in data compromise. The second is malicious eavesdropping, which occurs whenever someone intentionally attempts to intercept someone else's data stream.

Wireless Hijacking: A hacker can configure his laptop to broadcast a signal as a wireless access point by using the same SSID as a legitimate public hotspot. When someone connects to the signal, they're open to monitoring or peer-to-peer attacks.

Download

Download

Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

By submitting this form you agree that you have read, understood, and are able to consent to our privacy policy.

LEARNING ON MOBILE

Learn anytime anywhere with our mobile apps.

I have read and understood the privacy policy and am able to consent to it.

© 2021 CBT Nuggets. All rights reserved. Terms | Privacy Policy | Accessibility | Sitemap | 1550 Valley River Drive, Eugene, OR 97401 | 541-284-5522
CBT Nuggets