Table of contents
- Areas Covered
- Auditing Wireless Networks
- Wireless Basics
- Wireless Attacking Tools and Frameworks
- Attacking Weak Encryption
- Cracking WPA2
- Wireless Client Attacks
- 802.11 Fuzzing Attacks
- Hotspots
- Rogue Networks
- Sniffing Wireless
- DoS on Wireless Networks
- Bluetooth Attacks
- High-Frequency RFID Attacks
- Low-Frequency RFID Attacks
- NFC Attacks
- Practical SDR Attacks
- Zigbee Pentesting
- DECT Attacks
- Offensive Devices
The GIAC Assessing and Auditing Wireless Networks GAWN certification is created to security professionals who need to learn and gain experience on wireless networks security.
This certification focuses on different wireless technologies I will try to explain each topic and recommend the best hardware on the market to engage into wireless security attacks.
Areas Covered
- Attacking weak encryption, 802.11 fuzzing attacks, bluetooth attacks
- Bridging the air gap, DECT, DoS on wireless networks, high-frequency RFID attacks, and RFID applications
- Hotspots, low-frequency RFID attacks, NFC, practical SDR attacks, and rogue networks
- Sniffing wireless, wireless basics, wireless client attacks, WPA2, and Zigbee
Auditing Wireless Networks
Wireless Basics
- Wireless Penetration Testing: Theory for Pentesters
Wireless Attacking Tools and Frameworks
- How to install Bettercap
- How to Install Kismet
- How to Install GNU Radio
- How to Install Wifiphisher
- How to Install Universal Radio Hacker
- How to Install Wifipumpkin3
- How to Install Airgeddon
- How to Install Sparrow-Wifi
Attacking Weak Encryption
- Cracking Clientless WEP Networks
Cracking WPA2
- Definitive guide how to Crack WPA Handshake with Different Tools
Wireless Client Attacks
802.11 Fuzzing Attacks
Hotspots
Rogue Networks
- How to Install Wifipumpkin3 on Kali Linux
Sniffing Wireless
- How to Install Wifiphisher on Kali
DoS on Wireless Networks
The candidate need to understand how common DoS attacks works and how to defend against them. In order to study for this GWAN chapter read our blog posts:
- How to DoS a Wireless Networks
Bluetooth Attacks
Bluetooth Low Energy Attacks
Bridging the Air Gap
High-Frequency RFID Attacks
The candidate will demonstrate understanding of RFID tracking techniques, and how to exploit mid to long-range RFID applications.
Low-Frequency RFID Attacks
Cloning Low-Frequency Tags
Cloning High-Frequency Tags
Cracking Tag Keys with Brute Forceli
NFC Attacks
Practical SDR Attacks
- HOW TO INSTALL UNIVERSAL RADIO HACKER ON KALI (URH)
- HOW TO INSTALL RTL_433 ON KALI
Replay Attacks
Rolling Code Attacks
Zigbee Pentesting
- ZIGBEE CC2531 SNIFFER PROTOCOL ANALYZER
- ZIGBEE ATTACKS TUTORIAL FOR PENTESTERS
DECT Attacks
Offensive Devices
- Offensive Devices
https://www.giac.org/certification/assessing-auditing-wireless-networks-gawn
wireless penetration testing