Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)

Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)
English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 5h 12m | 1.69 GB

More than 5 hours of video instruction to help you learn the skills necessary to perform advanced penetration testing of wireless networks and Internet of Things (IoT) devices.

Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.

Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career.

Topics include

  • Introduction to wireless technologies and protocols
  • Wireless infrastructure attacks
  • Wireless client attacks
  • Building your lab and attack hardware
  • Aircrack-ng
  • Cracking WEP
  • Hacking WPA
  • Performing wireless reconnaissance
  • Evil twins and rogue access points
  • Bluetooth security assessment and monitoring
  • NFC security assessment
  • Wireless defenses
  • Performing security assessments of IoT devices
  • Mobile device security
  • Hacking Android devices
  • Hacking iOS devices

Learn How To

  • Build your own wireless hacking labs and know what type of hardware you can use to perform wireless hacking
  • Use several open-source tools, such as Aircrack-ng
  • Crack WEP and examine different attacks against WPA
  • Perform wireless reconnaissance
  • Perform evil twin attacks, creating rogue access points
  • Performing security assessments of Bluetooth and NFC implementations
Table of Contents

01 Wireless Networks, IoT, and Mobile Devices Hacking - Introduction
02 Learning objectives
03 1.1 Introducing Wireless Hacking
04 1.2 Introducing Wireless Standards and Technologies
05 1.3 Understanding the 802.11 Standard
06 1.4 Understanding Bluetooth
07 1.5 Understanding NFC
08 1.6 Understanding 802.1x and Wireless Authentication Mechanisms
09 Learning objectives
10 2.1 Understanding Wireless Client Attacks and Their Motives
11 2.2 Learning Packet Injection Attacks
12 2.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications
13 2.4 Attacking Publicly Secure Packet Forwarding (PSPF)
14 2.5 Attacking the Preferred Network List (PNL)
15 Learning objectives
16 3.1 Understanding Wireless Antennas
17 3.2 Surveying Wi-Fi Devices Like the Pinneaple
18 3.3 Building Your Own Lab
19 Learning objectives
20 4.1 Introducing the Aircrack-ng Suite
21 4.2 Introducing Airmon-ng
22 4.3 Understanding Airodump-ng
23 4.4 Introducing Aireplay-ng
24 4.5 Introducing Airdecap-ng
25 4.6 Introducing Airserv-ng
26 4.7 Introducing Airtun-ng
27 Learning objectives
28 5.1 Understanding WEP Fundamentals
29 5.2 Learning How to Crack WEP
30 Learning objectives
31 6.1 Understanding WPA Fundamentals
32 6.2 Surveying Attacks Against WPA2-PSK Networks
33 6.3 Using coWPAtty
34 6.4 Using Pyrit
35 6.5 Exploring WPA Enterprise Hacking
36 Learning objectives
37 7.1 Using Kismet
38 7.2 Using Wireshark
39 7.3 Learning How to Hack Default Configurations
40 Learning objectives
41 8.1 Defining Evil Twin Attacks
42 8.2 Performing Evil Twin Attacks
43 8.3 Using Karmetasploit
44 8.4 Exploring the WiFi Pineapple
45 Learning objectives
46 9.1 Understanding Bluetooth Vulnerabilities
47 9.2 Surveying Tools for Bluetooth Monitoring
48 Learning objectives
49 10.1 Understanding NFC Vulnerabilities
50 10.2 Exploring NFC Attacks and Case Studies
51 Learning objectives
52 11.1 Understanding the Evolution of Wireless Defenses
53 11.2 Surveying Fast and Secure Roaming
54 11.3 Understanding Wireless Intrusion Monitoring and Prevention
55 11.4 Understanding Wireless Security Policies
56 Learning objectives
57 12.1 Understanding IoT Fundamentals
58 12.2 Exploring ZigBee and IEEE 802.15.4
59 12.3 Exploring INSTEON
60 12.4 Exploring ZWave
61 12.5 Exploring LoRA
62 Learning objectives
63 13.1 Understanding OWASP Mobile Device Vulnerabilities
64 13.2 Wrestling with the BYOD Dilemma
65 13.3 Understanding Mobile Device Management (MDM)
66 13.4 Understanding Mobile Device Security Policies
67 Learning objectives
68 14.1 Exploring The Android Security Model
69 14.2 Exploring Android Emulators and SDK
70 14.3 Understanding Android Hacking Tools and Methodologies
71 Learning objectives
72 15.1 Introducing iOS Security
73 15.2 Exploring Jailbraking iOS
74 15.3 Surveying Tools for Dissasembling iOS Applications
75 Wireless Networks, IoT, and Mobile Devices Hacking - Summary