CompTIA PenTest+: Wireless & Social Engineering Attacks
CompTIA PenTest+
| Intermediate
- 17 videos | 1h 52m 24s
- Includes Assessment
- Earns a Badge
A wireless attack is a security breach or exploitation that targets vulnerabilities in wireless networks and their connected devices. Social engineering attacks involve manipulating humans into divulging confidential information or performing actions against their own best interests. In this course, explore common wireless attack types, WPS PIN attacks, exploiting WPAD configurations, and performing a captive portal attack. Next, discover how to crack Wi-Fi passwords, identify network locations, detect rogue access points, and find and monitor Wi-Fi devices. Finally, learn about social engineering attacks and performing phishing, penetration testing, credential harvesting, target reconnaissance, platform user identification, and hacking of web browsers. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDifferentiate between different wireless attack typesUse responder to exploit web proxy auto-discovery (wpad)Use the wifi-pumpkin tool to perform a captive portal attackUse aircrack-ng to crack a wpa2 wi-fi handshakeUse wigle.net to find information about possible target locationsQuickly find rogue access points based on signal strength using inssiderUse kismet to detect nearby wi-fi devicesDifferentiate between different social engineering attacks
-
Use the social engineering toolkit (set) open-source penetration testing frameworkUse the gophish open-source phishing framework to test for vulnerabilitiesUse the evilginx2 open-source phishing framework during testing activitiesUse credential harvesting to clone websitesUse maltego to perform reconnaissance and social engineeringPerform open-source intelligence using recon-ng to identify users on platformsHook and attack web browsers using beefSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 13sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 7sUpon completion of this video, you will be able to differentiate between different wireless attack types. FREE ACCESS
-
8m 12sLearn how to use Responder to exploit Web Proxy Auto-Discovery (WPAD). FREE ACCESS
-
4m 35sDuring this video, discover how to use the WiFi-Pumpkin tool to perform a captive portal attack. FREE ACCESS
-
7m 43sFind out how to use Aircrack-ng to crack a WPA2 Wi-Fi handshake. FREE ACCESS
-
8m 56sIn this video, you will learn how to use Wigle.net to find information about possible target locations. FREE ACCESS
-
4m 46sDiscover how to quickly find rogue access points based on signal strength using inSSIDer. FREE ACCESS
-
8m 8sIn this video, find out how to use Kismet to detect nearby Wi-Fi devices. FREE ACCESS
-
6m 48sAfter completing this video, you will be able to differentiate between different social engineering attacks. FREE ACCESS
-
7m 41sDuring this video, you will learn how to use the Social Engineering Toolkit (SET) open-source penetration testing framework. FREE ACCESS
-
5m 42sIn this video, discover how to use the Gophish open-source phishing framework to test for vulnerabilities. FREE ACCESS
-
8m 33sFind out how to use the Evilginx2 open-source phishing framework during testing activities. FREE ACCESS
-
7m 9sIn this video, learn how to use credential harvesting to clone websites. FREE ACCESS
-
8m 21sDiscover how to use Maltego to perform reconnaissance and social engineering. FREE ACCESS
-
6m 54sIn this video, find out how to perform open-source intelligence using Recon-ng to identify users on platforms. FREE ACCESS
-
7m 16sLearn how to hook and attack web browsers using BeEF. FREE ACCESS
-
1m 21sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.