{"id":5324,"date":"2023-08-15T13:42:23","date_gmt":"2023-08-15T11:42:23","guid":{"rendered":"https:\/\/cyber-fi.net\/?p=5324"},"modified":"2024-09-15T09:11:53","modified_gmt":"2024-09-15T07:11:53","slug":"my-wlan-security-boot-camp-at-wlpc-eu","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2023\/08\/15\/my-wlan-security-boot-camp-at-wlpc-eu\/","title":{"rendered":"My WLAN Security Boot Camp at WLPC EU"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.thewlpc.com\" data-type=\"URL\" data-id=\"https:\/\/www.thewlpc.com\" target=\"_blank\" rel=\"noreferrer noopener\">Registration is now open for this year&#8217;s WLPC (Wireless LAN Professionals Conference) in Prague<\/a>. These are the important dates:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The main conference runs from the 25th to the 27th of October<\/li>\n\n\n\n<li>The pre-conference Boot Camps run from the 22nd to the 24th of October<\/li>\n<\/ul>\n\n\n\n<p><s>If there are enough registrations, I will teach the WLAN Security Boot Camp.<\/s><\/p>\n\n\n\n<p>Sadly, this training didn&#8217;t get enough bookings. Contact me if you are interested in this training individually for your company.<\/p>\n\n\n\n<p>I want to give some pieces of information about what to expect and what this training is not:<br>First, this training is not:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Hacking\/Pen testing training. That is what <a href=\"https:\/\/twitter.com\/CCIE5224\" data-type=\"URL\" data-id=\"https:\/\/twitter.com\/CCIE5224\" target=\"_blank\" rel=\"noreferrer noopener\">Phil Morgans<\/a> Boot Camp is for.<\/li>\n\n\n\n<li>An implementation training. We don&#8217;t configure anything, although some references about configuration on Cisco Catalyst 9800 exist. For Catalyst 9800 Implementation, <a href=\"https:\/\/twitter.com\/RockstarWifi\" data-type=\"URL\" data-id=\"https:\/\/twitter.com\/RockstarWifi\" target=\"_blank\" rel=\"noreferrer noopener\">Chris Avants<\/a> teaches &#8220;9800 Rockstar&#8221;, and <a href=\"https:\/\/twitter.com\/WirelessJimP\" data-type=\"URL\" data-id=\"https:\/\/twitter.com\/WirelessJimP\" target=\"_blank\" rel=\"noreferrer noopener\">Jim Palmer<\/a> teaches a Ruckus Class.<\/li>\n\n\n\n<li>A deeper look into vendor features. Probably 90 to 95 percent is vendor agnostic.<\/li>\n\n\n\n<li>A certification class. However, it will help you if you are preparing for the CWSP.<\/li>\n\n\n\n<li>An Analysis training. We will analyze communication in Wireshark, but we will focus entirely on everything that is security related. For a complete training on the analysis of WLANs, there is <a href=\"https:\/\/twitter.com\/mrncciew\" data-type=\"URL\" data-id=\"https:\/\/twitter.com\/mrncciew\" target=\"_blank\" rel=\"noreferrer noopener\">Rasika Nayanajiths<\/a> &#8220;Rockstar Wireless Analysis&#8221; or <a href=\"https:\/\/twitter.com\/MackenzieWiFi\" data-type=\"URL\" data-id=\"https:\/\/twitter.com\/MackenzieWiFi\" target=\"_blank\" rel=\"noreferrer noopener\">Peter Mackenzies<\/a> CWAP Wi-Fi Analysis.<\/li>\n\n\n\n<li>(And after mentioning these Boot Camps, <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/VoFi_Martin\" data-type=\"link\" data-id=\"https:\/\/twitter.com\/VoFi_Martin\" target=\"_blank\">Martin Ericson<\/a> teaches a CWNA-109, and <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/raymondhendrix\" data-type=\"URL\" data-id=\"https:\/\/twitter.com\/raymondhendrix\" target=\"_blank\">Raymond Hendrix<\/a> teaches a LoRaWAN Boot Camp together with <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/troymart\" data-type=\"link\" data-id=\"https:\/\/twitter.com\/troymart\" target=\"_blank\">Troy Martin<\/a>.)<\/li>\n<\/ul>\n\n\n\n<p>But what is this training:<br>This training aims to teach how many of the standards-based security functions in Wi-Fi work. In addition, we look at the Basics that enable these features. With that, the amount of theory will be extensive.<br>Where possible, we have labs where we capture the communication and analyze it in Wireshark for everything that we learned.<\/p>\n\n\n\n<p>Reviewing the agenda, you also find legacy technology like WEP and TKIP. For a good understanding, I think it is essential to know where we came from to evaluate where we are and where we are going.<\/p>\n\n\n\n<p>The agenda for this training is the following (but it still could change slightly):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Introduction<\/li>\n\n\n\n<li>802.11-Security<\/li>\n\n\n\n<li>Basic WLANs<\/li>\n\n\n\n<li>Captive Portals<\/li>\n\n\n\n<li>Cryptography Basics\n<ul class=\"wp-block-list\">\n<li>Symmetric cryptography<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>WEP<\/li>\n\n\n\n<li>WPA\/WPA2<\/li>\n\n\n\n<li>Cryptography Basics\n<ul class=\"wp-block-list\">\n<li>Asymmetric cryptography<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>SSL\/TLS<\/li>\n\n\n\n<li>Certificate Basics<\/li>\n\n\n\n<li>802.1X, EAP, RADIUS<\/li>\n\n\n\n<li>WPA2-Enterprise<\/li>\n\n\n\n<li>various EAP methods like EAP-MD5, PEAP, EAP-TLS, EAP-TTLS, \u2026<\/li>\n\n\n\n<li>RADIUS Security<\/li>\n\n\n\n<li>Fast BSSID Transition, 802.11r<\/li>\n\n\n\n<li>MFP<\/li>\n\n\n\n<li>WPA3\n<ul class=\"wp-block-list\">\n<li>WPA3-SAE<\/li>\n\n\n\n<li>WPA3-Enterprise<\/li>\n\n\n\n<li>WPA3-Transition<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>OWE<\/li>\n\n\n\n<li>Wireless IDS\/IPS<\/li>\n<\/ul>\n\n\n\n<p>I hope to meet in Prague and see many of you in my Boot Camp.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Registration is now open for this year&#8217;s WLPC (Wireless LAN Professionals Conference) in Prague. These are the important dates: If there are enough registrations, I will teach the WLAN Security Boot Camp. Sadly, this training didn&#8217;t get enough bookings. Contact me if you are interested in this training individually for your company. I want to <\/p>\n<div class=\"read-more-text\"><a href=\"https:\/\/cyber-fi.net\/index.php\/2023\/08\/15\/my-wlan-security-boot-camp-at-wlpc-eu\/\" class=\"read-more\">continue reading<\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[15,8,717],"tags":[538,716,664,715],"class_list":["post-5324","post","type-post","status-publish","format-standard","hentry","category-security","category-cisco-training","category-wireless","tag-security","tag-wi-fi","tag-wlan","tag-wlpc"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/5324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=5324"}],"version-history":[{"count":5,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/5324\/revisions"}],"predecessor-version":[{"id":5640,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/5324\/revisions\/5640"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=5324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=5324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=5324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}