Level: Intermediate to Advanced
Next Direction Technologies
Ethical Hacking is the best way to find vulnerabilities the way real hackers do. You use their tools and processes. You'll see real-time wireless sniffing and network penetration attacks using current hacker tools. This session pays special attention to wireless because it provides a more favorable cost:benefit to hackers. Warning: this session is not for those with weak constitutions as many of the attacks are difficult or impossible to defend against. This session will include demonstrations of live wireless hacking and Denial of Service (DOS) attacks.
You will learn:
- How to deploy and manage network snooping and enumeration tools
- How to use Wireshark to capture and analyze wireless traffic
- How to spoof wireless access points and clients to compromise network integrity