Description
Course info
Rating
(114)
Level
Beginner
Updated
Sep 28, 2018
Duration
3h 15m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Great! You have just finished setting up your wireless network. You did everything you were suppose to, like giving your SSID a unique name and securing your network with a strong password, so that someone can't piggyback off your network. Now that you are "safe and secure," you don't have to worry about hackers right? SLOW DOWN there skippy. While you have taken the "basic" steps required, you still need to be aware of some hacking methods that can be used to gain access to your network, despite your precautions. You also need to be very wary whenever you are accessing the network that is not your own, and let's not forget about other wireless technology; Bluetooth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
Ethical Hacking: Hacking Mobile Platforms
Beginner
4h 56m
Jan 29, 2019
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Threats from Wireless
So what are the threats from wireless? I mean, again, it's a great technology or great media. Is it really a media if it's wireless? That's beside the point. But the aspect is, at least in this course, is how do we evaluate the threats or the possibility of threats that we expose our networks to? So here comes another one of my famous quotes. This one may have been said while under the influence by Eddie "The Man" Van Halen. He said, "Wireless is wireless and it's digital. When digital first started, I swear I could hear the gap between ones and zeros. " Yeah, sure you could, Eddie. You just keep playing that guitar for me, would you? So in this module, we're going to go through and take a look at the fact that you're going to have lots of issues. Some of those issues are going to include the different types of attacks that can be made against your environment, and we'll go through and look at integrity attacks, confidentiality attacks, availability attacks and authentication attacks. We'll then go through and look at another vector, which is the attack on the access point, and that's going to include things such as rogue AP attacks, unauthorized associations, honeyspot. I did not misspell that. A lot of you guys may be thinking honeypot. Nope. It's called a honeyspot AP attack. And we'll also look at some AP MAC spoofing. The other vector would include attacks on the client, and those are going to include things such as a denial-of-service attack on the client, as well as ad hoc attacks, and we'll get our jamming on. So let's jump into this.

Hacking Bluetooth
So Bluetooth isn't normally something we would consider an attack vector, but it really is. It's a technology that allows for devices to share data over somewhat short distances. So don't get down in the dumps. I don't want you feeling like oh, yeah, I've got to do a quote, right? And who knew that I could throw in Big Bird along with hacking. But if you haven't seen that movie, Big Bird actually sings the song I'm so Blue. In fact, if you don't shed a tear while watching that scene, you're heartless. Well, in this module, we're going to go through and take a look at the different methods, the madness of packing Bluetooth. We'll go through and take a look at the threats that Bluetooth provides or creates, I should say. Then we'll make sure you understand some of the new terms that are going to be presented to you. Oh, I can't wait for this one. Then we'll also make sure you understand how Bluetooth at a very high level works, and, of course, we'll look at its security mechanisms, and then, of course, it can't be complete unless we talk about tools and attacking. So, cheer up, and let's get going.