Course

Wireless and Mobile Security and Penetration Testing - ZEIT8023

Faculty: UNSW Canberra at ADFA

School: School of Engineering & Information Technology @ UNSW Canberra at ADFA

Course Outline: ZEIT8023 Course Outline

Campus: UNSW Canberra at ADFA

Career: Postgraduate

Units of Credit: 6

EFTSL: 0.12500 (more info)

Indicative Contact Hours per Week: 3

CSS Contribution Charge: 2 (more info)

Tuition Fee: See Tuition Fee Schedule

Further Information: See Class Timetable

View course information for previous years.

Description

The last few years have seen a dramatic growth in the use of a vast variety of wireless and mobile network devices. It had been hoped that development in security infrastructure would have afforded the necessary protection to safely operate such a significant infrastructure of integrated services. Regrettably this has not been the case. Mariposa botnet, Conficker, Stuxnet, and Zeus (together with variants) have spelt disaster along with botnets, spam, zeroday attacks, trojans, spyware, spoofing, session hijacking, denial of service and many more as well as blended versions of these network attacks – even though the majority of these stacks are not specific to just wireless and mobile networks. Mobile devices once thought to be largely unaffected have seen dramatic changes with over 40 families of mobile malware threats appearing over the last couple of years.

Many of the techniques used to attack networks 10 years ago are still causing considerable damage today. These techniques have been reinvented and are frequently based on variations of basic themes or combinations of these used to form multi-vector and multi-payload attacks. The scale of interconnectivity that has evolved further compounds the damage that such attacks can cause. Further, wireless and mobile network access can bring with it the opportunity for hackers to exploit many of these attacks, all be it in different forms – many of which were not possible with wired networks. As networks have scaled in size and complexity so have attack vectors.

This course will examine the characteristics of a variety of wireless and mobile personal, local and wide area networks, including Bluetooth, NFC/RFID, Android, and IEEE802.11 variants of WLANs.


Attacks include:
· Masquerading/Spoofing Attacks
· MITM (Man in the Middle Attacks) - Spoofing MAC-based security, ARP poisoning WEP Crack (up to 128 bit)
· WPA and WPA2 PSK
· Advanced Attacks (Packet replay, DNS Spoofing, ARP poisoning, SSL Hacking)
· Smart Card reading/writing/copying /modification and key searches
· DoS (Denial of Service) Attacks
Aerial

Study Levels

UNSW Quick Links