Wi-Fi Security (Windows)
In this practical activity, you will use the NETSH WLAN utility to monitor, configure, and secure Wi-Fi settings on a Windows machine.
Why this activity? Organizations that introduce wireless technology risk increasing the potential for security breaches. Being able to monitor, manage, and secure wireless networks is an essential skill for security professionals.
C:\Users\samer>netsh wlan ?
The following commands are available:
Commands in this context:
? - Displays a list of commands.
add - Adds a configuration entry to a table.
connect - Connects to a wireless network.
delete - Deletes a configuration entry from a table.
disconnect - Disconnects from a wireless network.
dump - Displays a configuration script.
export - Saves WLAN profiles to XML files.
help - Displays a list of commands.
IHV - Commands for IHV logging.
refresh - Refresh hosted network settings.
reportissues - Generate WLAN smart trace report.
set - Sets configuration information.
show - Displays information.
start - Start hosted network.
stop - Stop hosted network.
In this activity, you will retrieve several wireless device and networks information on your machine.
In this activity, you will retrieve the security settings and reveal the password of a Wi-Fi profile.
Security settings
-----------------
Authentication : Open
Cipher : None
Security Key : Absent
Key Index : 1
Security settings
-----------------
Authentication : WPA2-Personal
Cipher : CCMP
Security Key : Present
Security settings
-----------------
Authentication : WPA2-Personal
Cipher : CCMP
Security Key : Present
Key Content : mypassword
In this activity, you will manage the Wi-Fi settings and harden the configurations as needed.
In this activity, you will create a wireless ad-hoc (IBSS) network that can be established without a wireless access point and allows multiple wireless devices connecting each other instantly.