Ultimate Hacking: Wireless Edition


Register Now

USA 2011 Weekend Training Session //July 30-31

USA 2011 Weekday Training Session //August 1-2


Why Do We Teach This Class?

Mission-critical data, secrets and other company information transmitted into the air cause hackers everywhere to rejoice!

Wireless networks bring unique challenges to those tasked with their defense. How confident are you that your wireless infrastructure can withstand the latest attacks by the world's cleverest hackers? Do vendors' claims tell the whole story? Where is your Achilles heel? Beyond the authorized wireless infrastructure you know exists in your organization, what about the wireless networks that aren't supposed to be there? Do you know when an onsite vendor or consulting company tucked away in a forgotten conference room plugs in their mobile access point?

What about that temporary access point in a QA lab that is still there months later? What about the wireless clients themselves? Laptops, smart phones, printers, VoIP phones, HVAC systems, and even the remote controls in your executive board rooms are all using wireless technologies. Organizations may have a secured wireless infrastructure but find themselves in trouble when these untamed devices are coaxed into connecting to a clever hackers fake access point. Untamed devices that are jacked into your companies ethernet seeking essids like "linksys" are creating a bridge for attackers to get onto your internal network.

Foundstone's internationally renowned, "Ultimate Hacking: Hands On" series goes wireless to help you see your wireless networks the way hackers see them. Learn the tools, techniques and methods attackers use against you in order to develop an effective defense against their increasingly sophisticated onslaught. Knowledge is power and you do not want the hackers to know more about your wireless networks than you do…

What Will You Learn:

Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.

Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.

Who Teaches This Class:

Based out of Foundstone's New York office, Brad is a senior security consultant focusing on internal/external penetration testing, web application penetration testing, firewall configuration reviews, network architecture reviews, and 802.11 wireless assessments. Brad is not only the network penetration testing service line lead, but has developed courseware and served as an instructor for Foundstone's "Ultimate Hacking" series classes.

Brad is a contributing author to the sixth edition of Hacking Exposed and has authored articles and white papers such as 802.11 Attacks, Defeating the iPhone Passcode and Java Basics - Extracting Decompiling, Recompiling, and Signing. He has developed wireless hacking tools such as "FreeRADIUS-WPE", various Metasploit modules, multiple internal Foundstone testing tools, and is currently assisting in developing two Foundstone free tools which will be released later this year. Finally Brad is involved in security research and is an active member of Foundstone internal vulnerability discovery team which focuses on finding application flaws in popular software. Brad is responsible for discovering a number of CVE's and has developed publically released exploit code to demonstrate impact.

What Do I Get?

Foundstone provides everything you will need to maximize your learning experience (e.g. laptops, targets, course materials).

All you need to bring is the desire to learn! Added Bonus! You get to take home the tools you use during class as below!

  • A customized Live Linux distribution installed on a USB thumb drive for maximum portability, increased speed, and laptop battery life
  • Your notes, live capture files, and anything else you put on the USB drive during class!
  • Foundstone T-shirt and pen

Who Should Take This Class?

Anyone responsible for the planning, implementation, maintenance, or assessment of wireless networks.

What to bring:

Nothing to bring. All necessary equipment will be provided including preconfigured workstations, tools and utilities.


Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 5 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions and write a weekly column for InfoWorld magazine. They are also frequent speakers at industry conferences such as NetWorld+Interop, Usenix, and the Black Hat Briefings.

Ends April 30
Ends Jun 15
Ends Jul 29