Jatin Malviya
November 10, 2025
ISSUED ON:
November 10, 2025
Jatin Malviya
Armour Infosec Wireless Penetration Tester (AIWPT)
Skills / Knowledge:
- Wireless Network Standards (802.11a/b/g/n/ac/ax)
- Wireless Encryption Protocols (WEP, WPA/WPA2/WPA3)
- Wireless Authentication (EAP, PEAP, TTLS)
- MAC Address Filtering & Spoofing
- SSID Broadcast Configuration & Discovery
- Wireless Signal Analysis & Coverage Limiting
- Denial of Service Attacks (RF Jamming, Deauthentication)
- Man-in-the-Middle (MITM) Attacks
- WEP Cracking Techniques (Chop-Chop, ARP Replay, PTW, KoreK)
- WPA/WPA2 Cracking & Dictionary Attacks
- TKIP & Michael Reset Attacks
EXPIRES ON: Does Not Expire
EARNING CRITERIA: Course
An Armour Infosec Wireless Penetration Tester (AIWPT) has demonstrated in-depth knowledge and hands-on expertise in wireless network security, assessment, and defense. They are proficient in:
- Wireless Networking Fundamentals: Understanding wireless standards (IEEE 802.11a/b/g/n/ac/ax), frequency bands, channels, and wireless transmission techniques.
- Wireless Network Configuration: Setting up and managing wireless access points, SSID configurations, network modes, and channel optimizations in Linux-based environments.
- Wireless Encryption and Authentication: Implementing and analyzing encryption protocols such as WEP, WPA/WPA2/WPA3, and authentication mechanisms like EAP, PEAP, and TTLS.
- MAC Address and SSID Management: Configuring MAC filtering, spoofing MAC addresses, hiding or discovering ESSIDs, and analyzing wireless coverage and signal strength.
- Wireless Attack Techniques: Performing and mitigating various wireless attacks including DoS (RF and deauthentication), MITM attacks, WEP cracking (Chop-Chop, ARP Replay, PTW, KoreK), WPA/WPA2 dictionary and Cowpatty attacks.
- Advanced WPA Attacks: Executing and defending against TKIP-related attacks such as Beck-Tews and Michael Reset, and understanding WPA2 handshake vulnerabilities.
- Sniffing and Packet Analysis: Using tools like Wireshark and Tcpdump to capture, interpret, and analyze wireless packets for troubleshooting and security auditing.
- Network Attacks and Defenses: Understanding and mitigating threats such as MAC flooding, DHCP starvation, rogue DHCP servers, ARP poisoning, and DNS spoofing.
- Wireless Intrusion Detection: Identifying rogue access points, detecting promiscuous sniffers, and deploying wireless intrusion detection and prevention systems.
- Network Security Management: Applying wireless security best practices, managing encryption keys, securing wireless infrastructure, and ensuring compliance with security policies.

