Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Kindle Price: £18.04

Save £12.95 (42%)

includes VAT*
* Unlike print books, digital books are subject to VAT.

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

BackTrack 5 Wireless Penetration Testing Beginner's Guide by [Ramachandran, Vivek]
Kindle App Ad

BackTrack 5 Wireless Penetration Testing Beginner's Guide Kindle Edition

4.6 out of 5 stars 15 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"

Length: 220 pages Enhanced Typesetting: Enabled Page Flip: Enabled
Optimised for larger screens
  • Due to its large file size, this book may take longer to download

Kindle Books Autumn Sale
Over 300 Kindle Books from 99p until 8 November, 2016. Shop now
Get a £1 credit for movies or TV
Enjoy £1.00 credit to spend on movies or TV on Amazon Video when you purchase any Amazon Kindle Book from the Kindle Store (excluding Kindle Unlimited, Periodicals and free Kindle Books) offered by Amazon.co.uk. A maximum of 1 credit per customer applies. UK customers only. Offer ends at 23:59 on Wednesday, September 27, 2017. Terms and conditions apply

Product Description

About the Author

Vivek Ramachandran is a world renowned security researcher and evangelist. He is the discoverer of the wireless "Caffe Latte Attack" and has delivered presentations in world renowned Information Security conferences such as Defcon and Toorcon in the US. His discoveries and talks have been widely quoted by the International media including - BBC Online, Network World, The Register, Mac World, Computer Online and others. In 2006, Microsoft declared Vivek as one of the winners of the Microsoft Security Shootout Contest held in India among an estimated 65,000 participants. In 2005, he was awarded a team achievement award by Cisco Systems for his work in the 802.1x and Port Security modules. He is well known in the hacking and security community as the founder of SecurityTube.net , a free video based computer security education portal which gets an estimated 100,000 monthly visitors. Vivek is also an accomplished trainer and travels around the world conducting workshops and training sessions for corporates and students. He holds a degree in B.Tech from IIT Guwahati and acts as an advisor to the computer science department's Security Lab.

Product details

  • Format: Kindle Edition
  • File Size: 18471 KB
  • Print Length: 220 pages
  • Publisher: Packt Publishing (9 Sept. 2011)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B005MMUM2W
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Enhanced Typesetting: Enabled
  • Average Customer Review: 4.6 out of 5 stars 15 customer reviews
  • Amazon Bestsellers Rank: #480,422 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images or tell us about a lower price?

Customer Reviews

4.6 out of 5 stars
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
After reading the first 3 Chapters I thought "wow this is great" - and I still do think that, but after a while I became a bit fed up of reading that a certain subject was beyond the scope of the book or it asking you to look further into a certain backtrack tool. I appreciate that you have to learn to think for yourself but the whole reason why I buy a book is so that it pulls everything together and things that are understandably beyond the scope of a book should be well referenced so that you can then spend some time searching these references online - for nearly £30 I would expect this from a book.

However, apart from a poor reference section this book is great! I set up the wireless lab that the book recommends although I would suggest you buy the alfa AWUS306NH which supports the "new" 802.11n network instead of just the old b and g networks which the suggested card in the book only supports. Backtrack 5 R2 now has the support for the new alfa card and there is no problem with injection. I would highly recommend that you set up this wireless lab and buy the wifi router as it allows you to see first hand how an Acess Point (AP) is affected. It also enables you to check that you are doing things correctly, for example, if you set up a WPA AP with a very short easy dictionary password but you are unable to crack the password then you know you must be doing something wrong. It is also good to log into your wifi router and see the connections and logs that are left behind. (I bought the D-Link Wireless N Router.
Read more ›
Comment 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Disclaimer: I have received this book from the publisher for special review. And author is good friend of mine. However the review remains genuine and unbiased.

This book is highly technical & written completely from practical perspective. To get the best out of this book you need to parallely follow it up with your own setup as shown in first chapter. And at the end of it, there will be one more Wi-Fi ninja in the air.

Here is the complete chapter by chapter review,

First chapter starts with the famous line from `Abraham Lincoln' pressing on the importance of setting up the play ground,

"If I had eight hours to chop down a tree, I'd spend six hours sharpening my axe."

It lists both hardware/software requirements with 2 Wi-Fi enabled laptops, one injectible Wi-Fi card (Alfa AWUS036H) & a access point. Some more listing of alternative injectible Wi-Fi cards would have been better though. It is often difficult to get the right one especially for those who are outside USA/UK. In my initial days of wardriving, I remember waiting for entire year to get my first injectible USB dongle. And without the right card, you are on the back foot as you can't perform most of the attacks.

Remaining portion of first chapter shows how to install BackTrack, Setting up access point and wireless cards in detail with screenshots. Next one explains in brief about wireless frames and shows how to capture the Wi-Fi packets in the air and inject your own packets using Alfa card.

It goes more interesting with chapter 3 showing how to bypass various wireless security restrictions such as hidden SSIDs, defeating MAC filters, bypassing WEP authentication etc. Next it shows how to really crack those 128 bit WEP keys using aircrack-ng tool.
Read more ›
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book walks you through the essential wireless protocol vulnerabilities very well, first by setting up a lab to test the theory in the book, and then by building on your knowledge piece by piece; each time with practical exercises to complete. This well written book WILL allow the beginner to gain a good awareness of wireless security issues. A great grounding for taking your studies to the next level..
I would have liked a greater range of tools to have been covered but this could complicate matters and detract from the real security material so ultimately I am glad the author resisted this and stuck to their progressive chapters - which essentially follow the following pattern - theory, do, pop quiz & summary. I personally learn better by doing and this book does not leave it too long before investigating the theory with a practical exercise - Highly recommended.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
I give it 5 stars because it does what the title says it does. It's a beginners guide.

Personally, I did some stuff before this. I have v.little experience on Linux, created my bt5 live cd, learnt how to monitor my wireless nic, send de-auths, capture .pcap files and use the dictionary attack on them. It took me a good 4-5 hours or so of googling & running into problems and fixing them.

If I had this book it would have saved me these hours searching how to do things so I wish I had it before I played with bt5. Anyway, I'm half way through the book & I'd say that if you can do what I just described then you already know 40% of whats in the book (add another 10% if you know how to do it for WEP). Looks like the upcoming chapters might be have a few cool things though with mis-association atttacks & man in the middle.

Wouldn't recommend this book for anyone but proper begineers. But that's exactly what the book was aimed to do - hence the title.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

click to open popover