Hack8: WLAN Hacking and WLAN Security

Wireless LAN is an extremely attractive technology. It enables a large number of devices to use the internet without cables and provides quick and easy access to the World Wide Web. As it becomes more widespread, the number of official hot spots is increasing coupled with continuous growth in the available bandwidth. But how secure is WLAN? Is the development of WLAN accompanied by corresponding protection measures against misuse? 


Principles of WLAN technology

  • Standards
  • Terms

Creation of a WLAN environment

  • Under Linux (ad hoc, infrastructure)

WLAN sniffing

  • Spying on unsecured wireless networks

Security approaches in the 802.11 Standard

  • Analysis of weaknesses
  • SSID-/MAC-based filters, WEP

Extensions of the 802.11 Standard

  • WPA, WPA2, 802.11i

Authentication in 802.11i

  • 802.1x, EAP, PSK

Key management in 802.11i

  • Key hierarchies
  • Handshakes

Mode of operation of encryption mechanisms

  • WEP
  • TKIP
  • CCMP

WLAN hacking

  • DoS attacks
  • WEP cracking
  • Attacks on WPA/WPA2-PSK
  • Attacks on WPS
  • Attacks on WPA2 enterprise
  • Ways to attack captive portals
  • The smartphone: A helpful tool

Technical requirements

Basic knowledge of network technology


Two days