The
Wi-Fi Penetration Testing Tools and Techniques
module introduces you to a range of Wi-Fi pentesting tools, each selected to demonstrate techniques suited for different environments and stages of an engagement. You’ll have the opportunity to work through practical examples that feature the wide variety of technologies, protocols, and security configurations encountered in the field, allowing you to gain hands-on experience in choosing and applying the right tools for your engagement.
Key learning outcomes:
  • How to conduct reconnaissance with Airodump-ng, Kismet, LinSSID, WifiDB, and Sparrow WiFi
  • Using tools such as WiGLE to conduct Open Source Intelligence
  • In-depth understanding of automated attack frameworks such as H4rpy, Wifite2, and Fern WiFi Cracker
  • How to gather and crack passwords using Pyrit, Aircrack-ng, and Pmkidcracker
Screenshot 2025-11-21 at 3
The
Attacking Corporate Wi-Fi Networks
module incorporates a simulated Wi-Fi penetration test from start to finish, emphasizing hands-on techniques that reflect real-world engagements. It involves conducting scoped reconnaissance, assessing wireless configurations, and evaluating common attack surfaces across WPA2, WPA3, and Enterprise deployments. The environment culminates in a demonstration of internal network pivoting, including Active Directory access, all performed within a controlled, simulated environment and in adherence to strict legal and ethical boundaries.
Key learning outcomes:
  • Reviewing rules of engagement and scope to prepare for authorized Wi‑Fi assessments
  • How to conduct reconnaissance, abuse guest networks, and compromise WPA2, WPA3, and Enterprise Wi‑Fi environments
  • Skills for executing advanced attacks, including Karma, Mana, router exploitation, and internal pivots
  • Understanding how how to enumerate Active Directory, escalate privileges, move laterally, and compromise the domain
Screenshot 2025-11-21 at 3