Education

Education is the most powerful weapon used to change the world

Having trained thousands of students on the art of network and application exploitation for the past decade, it's safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios.

Wireless

Wireless

This course teaches the student the techniques used when owning Wi-Fi networks and technologies. Over two days, the student will learn the basics of Wi-Fi attack scenarios and become familiar with breaking and exploiting WEP/WPA/WPA PSK in many real-world situations from detecting wireless users and probe requests, to targeted wireless attacks against specific users or infrastructure.

Course outline

What's your Wi-Fi password?

This course is all about owning Wi-Fi networks and technologies. In the past few years we've released tools such as Snoopy and MANA, that look at how wireless networks are being used and how they can be exploited.

Breaking the air

Over two days, you'll learn the basics of Wi-Fi and attack scenarios and delve right into breaking and exploiting WEP/WPA/WPA PSK in many real-world situations, such as coffee shops and corporate environments. From detecting wireless users and probe requests, to targeted wireless attacks against specific users or infrastructure, this course covers all attack angles.

Rogue Access Points

At Defcon 2014, we presented several improvements in Wi-Fi rogue access point attacks. We entitled the talk Mana from heaven and released the MANA toolkit. This module looks at those improvements to current attack tools and gets you into the mindset of owning users and networks.

SensePost Training Portal

We've developed a training portal for students to interact with the trainers, keep updated on content and also download all files, slides and tools delivered during the course. This portal is made available to all students, even when the course has finished. In addition, we've moved our training infrastructure into our own cloud, which means students get their own individual environments to test against, making use of VPN's and numerous targets. This gives a fully immersive experience of attacking real-world architecture and networks.

Location

Our courses are delivered publicly by our training partner Blackhat. For further information on the next public course, please visit Blackhat.com. If you wish to have In-house training, please get in touch with our sales team to discuss further.