New Skills

New Training: Wireless and Mobile Device Attacks and Tools

by Team Nuggets
New Training: Physical Penetration Testing picture: A
Published on February 25, 2021

In this 8-video skill, CBT Nuggets trainer Bob Salmans discusses wireless and mobile device attacks and the tools used to carry them out. He’ll also walk through multiple wireless attacks and show how they are executed. Watch this new CompTIA training.

Learn CompTIA with one of these courses:

This training includes:

  • 8 videos

  • 50 minutes of training

You’ll learn these topics in this skill:

  • Wireless and Mobile Device Attacks and Tools

  • Sniffing Wireless Data

  • Wireless Analysis With Kismet

  • Wireless Deauthentication Attacks

  • Cracking WPA2 Preshared Keys

  • Wireless Evil Twin Attack

  • Automated Wifi Attack Tools

  • Section Review

4 Most Common Wireless Attacks

Although hacking heavily leverages innovation and creativity, certain attacks are used more commonly than others. Knowing which tactics you'll most likely encounter is foundational to defending against them.

Rogue Wireless Devices: This is an unauthorized device that isn't under the management of network admins. If a hacker can add one to a network, it opens a gateway to the network.

Peer-to-Peer Attack: Devices connected to the same access point can interact with each other unless that function has been disabled by the provider.

Eavesdropping: There are two types of eavesdropping. The first is casual eavesdropping, where a wireless client actively scans in search of wireless access points. Although this is common and not necessarily malicious, it can still result in data compromise. The second is malicious eavesdropping, which occurs whenever someone intentionally attempts to intercept someone else's data stream.

Wireless Hijacking: A hacker can configure his laptop to broadcast a signal as a wireless access point by using the same SSID as a legitimate public hotspot. When someone connects to the signal, they're open to monitoring or peer-to-peer attacks.



Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

By submitting this form you agree that you have read, understood, and are able to consent to our privacy policy.

Don't Miss Out

Get great content delivered to your inbox.

I have read and understood the privacy policy, and am able to consent to it.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2022 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522