Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
|Print List Price:||£30.99|
Save £12.95 (42%)
BackTrack 5 Wireless Penetration Testing Beginner's Guide Kindle Edition
|New from||Used from|
Customers Who Bought This Item Also Bought
Top Customer Reviews
However, apart from a poor reference section this book is great! I set up the wireless lab that the book recommends although I would suggest you buy the alfa AWUS306NH which supports the "new" 802.11n network instead of just the old b and g networks which the suggested card in the book only supports. Backtrack 5 R2 now has the support for the new alfa card and there is no problem with injection. I would highly recommend that you set up this wireless lab and buy the wifi router as it allows you to see first hand how an Acess Point (AP) is affected. It also enables you to check that you are doing things correctly, for example, if you set up a WPA AP with a very short easy dictionary password but you are unable to crack the password then you know you must be doing something wrong. It is also good to log into your wifi router and see the connections and logs that are left behind. (I bought the D-Link Wireless N Router.Read more ›
This book is highly technical & written completely from practical perspective. To get the best out of this book you need to parallely follow it up with your own setup as shown in first chapter. And at the end of it, there will be one more Wi-Fi ninja in the air.
Here is the complete chapter by chapter review,
First chapter starts with the famous line from `Abraham Lincoln' pressing on the importance of setting up the play ground,
"If I had eight hours to chop down a tree, I'd spend six hours sharpening my axe."
It lists both hardware/software requirements with 2 Wi-Fi enabled laptops, one injectible Wi-Fi card (Alfa AWUS036H) & a access point. Some more listing of alternative injectible Wi-Fi cards would have been better though. It is often difficult to get the right one especially for those who are outside USA/UK. In my initial days of wardriving, I remember waiting for entire year to get my first injectible USB dongle. And without the right card, you are on the back foot as you can't perform most of the attacks.
Remaining portion of first chapter shows how to install BackTrack, Setting up access point and wireless cards in detail with screenshots. Next one explains in brief about wireless frames and shows how to capture the Wi-Fi packets in the air and inject your own packets using Alfa card.
It goes more interesting with chapter 3 showing how to bypass various wireless security restrictions such as hidden SSIDs, defeating MAC filters, bypassing WEP authentication etc. Next it shows how to really crack those 128 bit WEP keys using aircrack-ng tool.Read more ›
I would have liked a greater range of tools to have been covered but this could complicate matters and detract from the real security material so ultimately I am glad the author resisted this and stuck to their progressive chapters - which essentially follow the following pattern - theory, do, pop quiz & summary. I personally learn better by doing and this book does not leave it too long before investigating the theory with a practical exercise - Highly recommended.
Personally, I did some stuff before this. I have v.little experience on Linux, created my bt5 live cd, learnt how to monitor my wireless nic, send de-auths, capture .pcap files and use the dictionary attack on them. It took me a good 4-5 hours or so of googling & running into problems and fixing them.
If I had this book it would have saved me these hours searching how to do things so I wish I had it before I played with bt5. Anyway, I'm half way through the book & I'd say that if you can do what I just described then you already know 40% of whats in the book (add another 10% if you know how to do it for WEP). Looks like the upcoming chapters might be have a few cool things though with mis-association atttacks & man in the middle.
Wouldn't recommend this book for anyone but proper begineers. But that's exactly what the book was aimed to do - hence the title.
Most Recent Customer Reviews
Good read for junior security researchers and practitioners. The book outlines fundamental concepts and informs the discussion on the broad and evolving topic of security... Read morePublished 1 month ago by Matthieu Petrigh
Perfect for keeping in your kindle library.
All the tests laid out in a great step by step fashion. Read more
It certainly makes you realise how vulnerable wireless access really is and makes you think what's the best methods to make your wireless more secure. Read morePublished on 10 Jun. 2012 by finneysan
Anyone with a serious interest in wireless security must have this book on their shelf.
Vivek pitches the information at the right level to help people start in this topic... Read more
Purchased this book with intention to update my skill levels & check on the security of my system.
The easy steps that this book guides you along soon have testing the live... Read more
Bought this book a couple of weeks ago, very recommended for those who are a bit shakey with Linux and need to know more about Wi-Fi security.Published on 15 Nov. 2011 by M. Aiash
This is by far the best technical security book I've ever read. It is clear that the author Vivek not only understands the topic extremely well, but possesses the skill in being... Read morePublished on 30 Oct. 2011 by Javvad Malik
This book must surely have been written with a subversive gleam in Ramachandran's eye. It is the equivalent of the Anarchist's Handbook from the 1960s. Read morePublished on 23 Oct. 2011 by W Boudville
Look for similar items by category
- Books > Computing & Internet > Networking & Security > Introduction to Network & Security
- Books > Computing & Internet > Networking & Security > Security
- Books > Computing & Internet > Networking & Security > Wireless
- Books > Computing & Internet > UNIX & Linux
- Kindle Store > Kindle eBooks > Computing > Networking > System Administration > Linux & UNIX Administration
- Kindle Store > Kindle eBooks > Computing > Security & Encryption
- Kindle Store > Kindle eBooks > Computing > Tech Culture & Computer Literacy > Information Technology