Course Description
Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass.
Learning Objectives
Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
- recognize common threats against wireless networks like exploiting poorly configured devices, deploying Rogue APs, Evil Twin APs, Ad-hoc connections, and honeypot APs
- recognize more complex wire network attacks such as MAC filter bypass by MAC spoofing and revealing hidden wireless networks