📶 Core Areas of Wireless Pentesting
Garage doors, key fobs, remotes
Access cards, mobile payments
LTE/5G IMSI catchers (advanced)
🧨 Vulnerable Wireless Labs & Simulators
1. Wifipumpkin3
Wireless rogue AP toolkit for MiTM attacks.
Simulate captive portals, DNS spoofing, phishing Wi-Fi.
Great for social engineering via Wi-Fi.
Full-featured wireless attack framework .
WPA/WPA2 cracking, Evil Twin APs, DoS, captive portals.
Works with multiple wireless adapters.
Tool for automated phishing over Wi-Fi .
Creates fake AP + phishing portals to capture credentials or install malware.
4. BLE CTF by Attify
Bluetooth Low Energy (BLE) vulnerable lab.
Practice GATT enumeration, MITM, fuzzing, unauthenticated access.
5. HackRF Wireless Replay Labs
Use HackRF + SDR to capture and replay:
Try practical scenarios using:
rfcat, GNU Radio, URH (Universal Radio Hacker)
6. Kismet + Pi + FakeAP Lab
Build a lab with:
Raspberry Pi + Alfa AWUS036NHA
Kismet or Hostapd + captive portal
Practice detection, fake APs, rogue device monitoring
Cracking WEP/WPA handshakes
hcxdumptool + hcxpcaptool
Sniffing, fuzzing BLE devices
Smart home Zigbee sniffing/fuzzing
Sub-GHz capture/replay (Yardstick One)
URH (Universal Radio Hacker)
Clone, sniff, or emulate RFID tags
Protocol-level packet analysis
EAP credential capture for WPA-Enterprise networks
🧪 Online Training Platforms with Wireless Content
🔹 TryHackMe – “Wireless Hacking” Room
Focuses on WPA cracking, Evil Twin APs, MITM attacks.
Practical and beginner-friendly.
🔹 HackTheBox – Hardware/Radio Challenges
RF, SDR, and BLE challenges occasionally appear.
Advanced, red-team style scenarios.
🔹 Attify Academy (Wireless & IoT Security) (Paid)
Great for:
BLE, Zigbee, and Wi-Fi hacking
🧱 Hardware for Wireless Pentesting Labs
Wi-Fi injection, monitor mode
SDR capture and replay (RF, ISM bands)
Sub-GHz TX/RX (garage doors, sensors)
Multi-protocol hacker gadget (RFID, BLE, IR, 433MHz)
Advanced RFID/NFC manipulation
Bluetooth Classic sniffing
BLE injection and sniffing
Portable wireless test device or rogue AP host
📚 Wireless Pentesting Learning Path (Structured)
Hostapd-WPE, EAP phishing
Wifiphisher, WiFiPumpkin3
BLE Enumeration & Exploitation
Zigbee2MQTT, packet sniffing
📦 Want a Custom Wireless Lab Setup?
I can help you build a local wireless hacking lab , including:
✅ Fake AP + captive portal (via Pi or laptop)
✅ BLE vulnerable server & client (e.g., via BLE-CTF)
✅ SDR replay lab using HackRF or Flipper Zero
✅ Wi-Fi WPA handshake cracking and PMKID attacks
✅ Zigbee smart bulb lab (w/ USB coordinator)
7. Wireless Pentesting CTF (by Sektor7 / S4xLabs)
Pre-built wireless CTF challenge VMs simulating WEP/WPA/WPA2 networks.
Includes Evil Twin, captive portals, and client attacks.
Run via VirtualBox or live USB setup.
8. BlueZ + GATT Server (DIY BLE lab)
Set up a Linux-based Bluetooth Low Energy GATT server to test:
9. BLE Challenges at Crackmes.one or HTB
Occasionally host downloadable BLE firmware or app-based puzzles .
Practice reverse engineering BLE keys or fuzzing GATT endpoints.
10. RFID/NFC Pentest Kits with Real Cloning Labs
Use Proxmark3 RDV4 , Mifare tags, or Flipper Zero to:
Clone RFID access cards (e.g., Mifare Classic, HID Prox)
Crack sector keys with nested attacks (hf mf commands)
DIY low-cost fake AP attack
Jam frequencies with HackRF
NRFConnect / NRF52 Dongle
Direct communication and sniffing for Nordic-based devices
Open-source RF analysis + spectrum viewer
Wardriving + real-time signal geolocation
Advanced SDR-based 2G capture and replay
Packet injection, scanning, and deauth attacks via ESP-based microcontroller
📡 Wireless Frequencies & What You Can Hack
Frequency Band
Protocols
Examples
Routers, smart bulbs, fitness trackers
Newer routers, mesh systems
Sub-GHz (315/433/868/915 MHz)
Garage doors, alarms, sensors
Key cards, transit passes
Cell signals, long-range IoT
Cellular, IMSI catching (advanced)
🧠 Real-World Wireless Attack Scenarios to Simulate
WPA2 Enterprise EAP Phishing
Use hostapd-wpe or eaphammer to capture RADIUS creds
Set up fake APs with portals to capture cookies, creds
GATT fuzzing or advertisement spoof (e.g., fake fitness tracker)
Capture + replay signals with HackRF (e.g., garage door openers)
MITM or sniff pairing packets
Dump and clone hotel or office access cards
Use Osmocom or srsRAN for GSM tracking (legally controlled!)
📚 Wireless Security Certifications (If You’re Going Pro)
OSWP (OffSec Wireless Professional)
CWSP (Certified Wireless Security Professional)
✅ For enterprise defenders
Attify IoT Security Expert
SANS SEC617 / GWAPT + Wireless Add-On
Hack The Box — Radio Challenges
💡 Lab Setup Ideas by Protocol (Local Practice)
🔹 Wi-Fi Pentest Lab
Alfa NIC + Kali + aircrack-ng suite
Fake AP + captive portal via hostapd or airgeddon
Clients: laptop, phone, IoT devices
BLE test app (e.g., BLE Hero)
BLEAH / Gattacker for attack
🔹 RF Replay Lab
HackRF One + remote control toy or garage clicker
Capture in URH → Analyze → Replay signal
Optional: Jam via HackRF rfcat
🔹 RFID/NFC Clone Lab
Proxmark3 RDV4 + Mifare cards
Dump → Crack → Emulate or clone tag
Flipper Zero as alternative for fast testing
🧰 Want a Custom Lab or Walkthrough?
I can help you build a modular wireless hacking lab , such as:
✅ Wi-Fi rogue AP with auto-deauth and captive portal
✅ BLE attacker/emulator for wearable spoofing
✅ RF replay test bed with HackRF or Flipper
✅ RFID/NFC clone station for facility security testing
Last updated 6 months ago