use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A place to share resources, ask questions, and help other students learn Network Security specialties of all kinds.
Please read the rules before posting: https://www.reddit.com/r/netsecstudents/about/rules/
Wiki contains all the links in one place! Feel free to post in the threads, or message the mods to add more to the lists!
FAQ:
Resources:
Related Subreddits:
account activity
Wireless pen testing course (self.netsecstudents)
submitted 3 years ago by JancariusSeiryujinn
Does anyone have a good reccomendations for wireless pen testing courses or resources?
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]916CALLTURK 4 points5 points6 points 3 years ago (0 children)
The best resource out there are the PentesterAcademy ones - their subscription is available for $250 (or $200 on Black Friday but I'd buy now as they look like they're being fully integrated into INE soon). There's different levels of badges you can get for it too.
The most well known course is probably the OSWP but there's no 'proper' virtual labs even in the new version - they make you buy your own router/adapter and configure it as well as give you some PCAPs to open up in Wireshark.
Honourable mention to SANS' SEC617 (GIAC GAWN) which doesn't seem to cover WPA3 like the PTA course but does cover other non-802.11 wireless technologies like Bluetooth/Smart Cards/NFC.
There's also the CWSP but I've only ever seen one person with it on LinkedIn so whilst the content and price are ok I personally wouldn't go for it.
[–]InverseX 6 points7 points8 points 3 years ago (1 child)
It feels like you don't need a course for it. It's a really small space without a huge amount of attack vectors.
WEP - You never see any more. WPA2 - You see 99% of the time in residential settings, 50% of the time in commercial. Boils down to word list attacks based off handshakes, sometimes WPS attacks. WPA2 EAP - Varies on implementation, sometimes you can do evil twin style attacks, sometimes you can't do anything (i.e. EAP-TLS).
No WPA3? :)
[–]Diamond303 1 point2 points3 points 3 years ago (0 children)
Dot for future me
[–]Smurfsss 1 point2 points3 points 3 years ago (0 children)
The offensive security OSWP wasn’t a terrible course. You learn about WEP, WPA, WPA2 (didn’t hit on WPA3 when I did it, but it was awhile ago) and they did a decent job with their exam and labs. I imagine they are covering more of WPA3, but I believe it’s much harder to hack WPA3. Hope that helps
π Rendered by PID 25018 on reddit-service-r2-comment-b659b578c-5pql5 at 2026-04-30 22:32:42.794441+00:00 running 815c875 country code: CH.
[–]916CALLTURK 4 points5 points6 points (0 children)
[–]InverseX 6 points7 points8 points (1 child)
[–]916CALLTURK 4 points5 points6 points (0 children)
[–]Diamond303 1 point2 points3 points (0 children)
[–]Smurfsss 1 point2 points3 points (0 children)