Book excerpt: BackTrack 5 Wireless Penetration Testing -Beginner’s Guide

In BackTrack 5 Wireless Penetration Testing - Beginner’s Guide, Vivek Ramachandran teaches WiFi pen-testing using BackTrack 5 in a lucid, exhaustive style.

Vivek Ramachandran’s book, ‘BackTrack 5 Wireless Penetration Testing - Beginner’s Guide’ released early this month, may be just what you were looking for, if wireless hacking is your thing. This guide uses a step-by-step approach to help you get started immediately with Wireless Penetration Testing, combining live examples, and an engaging style to give the reader a practical, hands-on experience.

BackTrack 5 Wireless Penetration Testing - Beginner’s Guide, covers various methodologies that gradually grow in complexity, as you work your way through. The book takes you through the basic concepts in WiFi and goes to equip the reader for conducting bleeding edge wireless attacks. Every new attack is described in the form of a lab exercise, with illustrations of all associated steps.

The chapter excerpt featured here is titled “Attacking the client”, and is taken from chapter 6 in the book. Some of the other things Ramachandran covers in the book are – War Driving, WLAN packet sniffing, network scanning, circumventing hidden SSIDs and MAC filters, bypassing shared authentication, cracking WEP and WPA/WPA2 encryption, access Point MAC spoofing, rogue devices, evil twins, denial of service attacks, viral SSIDs, man-in-the-middle attacks, evading wireless intrusion prevention systems, among others. A full table of contents can be downloaded here.

BackTrack 5 Wireless Penetration Testing - Beginner’s Guide, is published by Packt publications, and is available for purchase online. It is definitely worth a gander if you are an IT security professional, aspiring penetration tester or security enthusiast. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

This was last published in September 2011

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Endpoint security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close