About this course

Rockstar Wireless Hacking is a new original class from Wi-Fi Training designed to teach WLAN Engineers and Administrators the methods and process used to attack 802.11 based WLAN targets covering over 15 different scenarios and methods. Students can choose between a live 2-day Instructor-Led Course, or instant Learn-On-Demand HD Video series option with over 6hrs of HD video. 

NOTE - 4/2/21 - Some of our example videos were recently BANNED from YouTube, so unfortunately we can only share examples these companies don't consider too dangerous unless you purchase the program and access it through our LMS.

The goal is that Wireless Engineers, Security Professionals, and Administrators all understand the threat landscape facing enterprise wireless networks. Through understanding the attacker methods, processes, and vectors students will have a clear understanding of potential risk and can then better identify risk and responses required to mitigate these threats. 

This Rockstar Course is available now via Video On Demand. 

Pricing options

Purchase this course, or enroll in our All Access program and get access to everything on this site for a year, or as long as you keep your membership active.

Course curriculum

  • 1

    Rockstar Wireless Hacking - Intro

    • 0 RWH - Course Intro - w Blue Hair

    • 0-1 Code Version Update Notification

    • 0-2 Installing RTL8812AU adapter on Kali linux 2020

  • 3

    Module 2

    • 2-1 Passive Capture Lesson

    • 2-2 Passive Capture Lab

  • 4

    Module 3

    • 3-1 Soft AP via Bridging MiTM Lesson

    • 3-2 Soft AP Bridging MiTM - Lab

    • 3-3 Soft AP Step by Step Lesson

    • 3-4 Soft AP Step by Step Part 1 hostapd

    • 3-5 Soft AP Step by Step - Lab 2 using airbase-ng

    • 3-6 Soft AP Step by Step Part 2 - hostapd

  • 5

    Module 4

    • 4-1 Attacking WPA2p - Lesson

    • 4-2 Attacking WPA2p - Lab

  • 6

    Module 5 - Layering Attacks

    • 5-1 Layering Attacks - Lab Intro to Lesson

    • 5-2 Layering Attacks Lesson

    • 5-3 Layering Attacks XSS Example

  • 7

    Module 6 - Attacking WPA2e

  • 8

    Module 7 - Expanding WLAN Attacks

    • 7-1 Expanding WLAN Attacks with Phishing -Edit2

    • 7-2 Expanding WLAN Attacks with Phishing

    • 7-3 Installing wp3 framework on Kali2020

    • 7-4 WP3 MiTM via Captive Portal - Creds

    • 7-5 WP3 MiTM via Captive Portal Bonus

    • 7-6 WP3 - using pulps

  • 9

    Module 8 - Using Captive Portals

    • 8-0 Great way to Hack using Captive Portals and Websites - Lesson Lab

    • 8-1 Analyzing Captured Data - Lessons

  • 10

    Module 9

    • 9-1 WLAN Review Part 1

    • 9-2 WLAN Review Part 2

    • 9-3 WLAN Review Part 3

    • 9-4 WLAN Review Part 4