A four-part tutorial and exercise with a focus towards Wi-Fi and RF detection, decoding, locating, sniffing, and hacking.
Part 1: Wireless 101
Introduction to Wi-Fi hardware, terminology, and common setups, as well as how to monitor Wi-Fi installs, WIDS/WIPS, and common risks.
Part 2: What the EAP?
Common vulnerabilities and attacking Wi-Fi systems with hands-on practice attacking WEP, WPA-PSK, WPA-EAP, and client systems.
Part 3: That’s no moon…
Wireless goes beyond 802.11 and 2.4GHz - an introduction to the world of software defined radio using the low-cost RTL-SDR device, as well as discussion about higher-end radio devices.
Part 4: Physical challenge
Find the transmitters we’ve hidden around the conference and crack the puzzles using the skills from parts 1-3
Required Hardware:
Students should come with (or should be provided with):
(Part 1, Part 2 and Part 4) TPLink Atheros adapter http://www.amazon.com/gp/product/B002WBX9C6/
(Part 3 and Part 4) RTL-SDR http://www.nooelec.com/store/software-defined-radio/sdr-receivers/terratec-t-stick-dvb-t-usb-stick-w-metal-antenna.html#.UkCFdXgifv4
(Part 1, Part 2, Part 3 and Part 4) A modern PC-based laptop (user-provided). Netbooks not recommended. * Macbooks - VMWare Fusion, or your milage may vary.
(Part 1, Part 2, Part 3 and Part 4) Pentoo Headsets and/or earbuds for private audio listening
Antennas http://www.amazon.com/TP-LINK-TL-ANT2409A-Directional-Antenna-connector/dp/B003CFATNS/ Students may bring their own additional antennas. For Wi-Fi applications, all connectors should be RP-SMA
Mike Kershaw / Dragorn - Author of Kismet and various other Wi-Fi tools. Russell Handorf - Built, owned and operated a wireless ISP for 6 years; Infosec professionally for 10 years (unprofessionally for 15); information security researcher (wireless, attacker attribution techniques, honeypots); and other things. Obviously a longer background to make up for the lack of awesomeness that is Mike.