Introduction to Wireless Ethical Hacking with Kali Linux

Learn Wireless Network Security using one of the Most Popular Security Linux Distribution

Instructors: Wayne Pruitt and Israel Arroyo (Stealthy Entry LLC)

Overview

The wireless industry is continually growing with more and more gadgets adding wireless functionality. Wireless access points, media centers, phones, security systems, cameras, coffee pots, toys are commonplace in the average household. Unfortunately, the wireless security that is implemented on this equipment is often vulnerable, providing digital access into the home. In practice, many people still use and deploy wireless equipment in their default configurations. This is most often due to poor security awareness or a lack of understanding of the risks and ramifications.

Learning Objectives and Outcomes

  • Introductions
  • Introduction to Hacking Linux Distros
    • Kali, Parrott, Pentoo and custom
  • Overview of Wireless Networking
    • Wireless Basics
    • Wireless Hardware
    • 802.11 Standards
    • Wireless Protocols
  • Wireless Monitoring
    • Identifying Access
    • Identifying Clients
    • Digital Mapping (WarDriving)
    • Labs- Students will perform monitoring of Wireless traffic.
    • Demonstration of WarDriving tools
  • Cracking WEP
    • Discuss WEP encryption
    • Crack WEP with a client
    • Crack WEP without a client
    • Lab- Students will perform steps to crack WEP encryption
  • Password Cracking
    • Password Fundamentals
    • Methods of Password Cracking
    • John The Ripper
    • CeWL
    • Crunch
    • Labs-Students will use various tools to create dictionary files for password cracking
  • Cracking WPA2
    • Discuss WPA and WPA2
    • Capturing the Handshake
    • Dictionary Attacks against WPA/WPA2
    • Decrypting captured Packets
    • Labs- students will capture handshakes and use dictionary files to crack password.
  • Time Permitting
    • Demonstrations:
      • Bluetooth monitoring

Student Requirements and Prerequisite:

  • Basic knowledge of Linux
  • Basic knowledge of Linux command line

What Students Should Bring

  • Bring a laptop with Virtual Box installed
  • Kali VM will be provided

Instructors’ Bio

Wayne Pruitt is a loving husband and father of 5. He totes a heavy duffle of IT certifications to include: MCAD, MCSD, MCDBA, C|EH, E|CSA, C|HFI, E|DRP, E|CND and E|CIH. Over the past 20 years he has held many jobs supporting a variety of roles within the Federal Government and Commercial ranks; ranging from instructor, system administrator, security administrator, developer and IT manager roles. He has presented a several Cyber conferences to include DerbyCon, Hacker Halted, Columbus and Cleveland Bsides..

Israel Arroyo is the Founder and CEO of Stealth Entry LLC, Cyber Security Solutions, a State of Ohio Minority Business Enterprise and Veteran Owned Small Business headquartered in Columbus Ohio. Stealth Entry specializes in supporting Corporate, Government, Military and Intelligence Community customers.

Israel’s past ventures also include working with the National Security Agencies Information Assurance Directorate in both his Military and Civilian Contractor roles. Israel currently supports the United States Joint Communication Support Element and United States Cyberspace Command in his Reserve Role.

Israel is an Alum from both Saint Leo University, where he earned his Bachelor of Arts Degree in Criminology, and Capitol College, where he earned his Master’s Degree in Information Assurance and Graduate Certificate in Network Protection. Israel also currently holds the CISSP, GPEN, GWAPT, CEH certifications in good standing.

DATE AND TIME

October 12, 2018

  • Morning session: 8:30 AM to 12 at noon
  • Lunch break: 12:00 to 1:00 PM
  • Afternoon session: 1:00 PM to 4:30 PM

REGISTRATION

Go to registration page to register for the training course and select “Ohio LinuxFest Institute Professional Pass”. During the registration process, you will get an option to select your training program.