Here is a list of some of the things you are going learn in class: You will become intimate with the aircrack-ng suite of tools. They are some of the best and most versatile tools out there; you'll know them like family when completed. you'll learn how to tall if MAC filters are in use and how to bypass them. If making WLANs stop working is your objective, we’ve got you covered. There are several ways to deny service to wireless users. We show you more than a few ways to commence a WLAN beat-down. We all know that WEP is busted 56 different ways and that it is an awful choice, even on my mother’s home network. But that doesn’t mean people don’t stall use it. You need to know all the ways in which it can be cracked and how to get your mits on the key as quickly as possible. WPA-PSK is probably the most common security you are going to come up against. Depending on the situation, there are many ways to attack it. You will attack WPA-PSK from every angle. WPA attacks need good lists and, sometimes, some good guessing. We will show you a variety of techniques to create WPA-PSK optimized wordlists and target-specific wordlist. If that doesn’t open the door will show you how to fully leverage the available brute-force options at your disposal. will also show you how to take WLAN key recovery efforts into the cloud. There are some powerful tools and powerful servers waiting for you to leverage them. Lots and lots of tools are used in this course. When you’re serious about attacking WLANs you'll be using Linux. Microsoft OS are targets, never attackers. But that doesn’t mean there aren’t some fun things we can do with Microsoft OS wireless functionality. Come to class. will show you!