This workshop will instruct attendees on how to carry out sophisticated wireless attacks against corporate infrastructure. Attendees will learn how to attack and gain access to WPA2-Enterprise networks, bypass network access controls, and perform replay attacks to gain administrative control over an Active Directory environment. External wireless adapters and networking hardware will be provided to all workshop attendees, and material learned in the lectures will be practiced within a realistic lab environment. Areas of focus include: Wireless reconnaissance and target identification within a red team environmentAttacking and gaining entry to WPA2-EAP wireless networksLLMNR/NBT-NS PoisoningFirewall and NAC Evasion Using Indirect Wireless PivotsMITM and SMB Relay AttacksDowngrading modern SSL/TLS implementations using partial HSTS bypasses