KeyHacking logoKeyHacking
Path

Network & Wi-Fi

Practice packet capture + analysis, safe MITM demos, WPA/WPA2 workflows, and network mapping. Everything runs in sandboxes or capture files built for learning.

What you’ll cover

  • Packet capture & reading flows (PCAP basics)
  • MITM demonstrations (ARP spoofing concepts, TLS caveats)
  • Wi-Fi security: WPA/WPA2-PSK handshake flow & pitfalls
  • Network discovery & mapping safely

Discovery & Mapping

Scope & permission docs first • Rate-limited scans • Safe banners only • Document subnets, gateways, services

Safety first

Use only provided lab files/targets. Never capture, probe, or interfere with networks you don’t own or have written permission to test.

Tip: pair this path with the Phish Detector to analyze suspicious links in emails captured in lab PCAPs.

Hands-on Labs

Follow the TCP Stream Easy

Use a PCAP to reconstruct a simple HTTP conversation and extract the hint.

ARP Spoof Demo Medium

Understand MITM via ARP, see what’s visible with/without TLS (demo only).

WPA/WPA2 Handshake Walkthrough Medium

Analyze a provided capture to identify the 4-way handshake and discuss defenses.

Safe Network Mapping Hard

Design a discovery plan for an internal lab, respecting rate-limits & scope.

Track your progress

Complete labs and submit times in the Arena leaderboard.

Open Arena

Cheat-sheets

PCAP Reading

  • Filter basics: ip, tcp, udp, dns
  • Wireshark: “Follow TCP Stream”, http.host, tls.handshake
  • Reconstruct flows; sanitize captures before sharing

MITM Concepts

  • ARP spoofing in switched LANs (demo scope only)
  • TLS salvages privacy; watch out for downgrade tricks
  • Defenses: static ARP, DHCP snooping, NAC, HSTS

Wi-Fi Security

  • 4-way handshake anatomy; PMK/PTK overview
  • Strong passphrases; disable WPS; prefer WPA2/WPA3
  • Guest VLANs; isolate IoT segments

Discovery & Mapping

  • Scope & permission docs first
  • Rate-limited scans; safe banners only
  • Document subnets, gateways, services