- Amazon Students Members Get an Extra 10% Off Selected Books Here's how (terms and conditions apply)
- Save 10% on Books for Schools offered by Amazon.co.uk when you purchase 10 or more of the same book. Here's how (terms and conditions apply) Enter code SCHOOLS2016 at checkout. Here's how (terms and conditions apply)
BackTrack 5 Wireless Penetration Testing Beginner's Guide Paperback – 9 Sep 2011
Save an extra 10% with Amazon Student*
|New from||Used from|
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Special Offers and Product Promotions
Frequently Bought Together
Customers Who Bought This Item Also Bought
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
About the Author
Vivek Ramachandran is a world renowned security researcher and evangelist. He is the discoverer of the wireless "Caffe Latte Attack" and has delivered presentations in world renowned Information Security conferences such as Defcon and Toorcon in the US. His discoveries and talks have been widely quoted by the International media including - BBC Online, Network World, The Register, Mac World, Computer Online and others. In 2006, Microsoft declared Vivek as one of the winners of the Microsoft Security Shootout Contest held in India among an estimated 65,000 participants. In 2005, he was awarded a team achievement award by Cisco Systems for his work in the 802.1x and Port Security modules. He is well known in the hacking and security community as the founder of SecurityTube.net , a free video based computer security education portal which gets an estimated 100,000 monthly visitors. Vivek is also an accomplished trainer and travels around the world conducting workshops and training sessions for corporates and students. He holds a degree in B.Tech from IIT Guwahati and acts as an advisor to the computer science department's Security Lab.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
However, apart from a poor reference section this book is great! I set up the wireless lab that the book recommends although I would suggest you buy the alfa AWUS306NH which supports the "new" 802.11n network instead of just the old b and g networks which the suggested card in the book only supports. Backtrack 5 R2 now has the support for the new alfa card and there is no problem with injection. I would highly recommend that you set up this wireless lab and buy the wifi router as it allows you to see first hand how an Acess Point (AP) is affected. It also enables you to check that you are doing things correctly, for example, if you set up a WPA AP with a very short easy dictionary password but you are unable to crack the password then you know you must be doing something wrong. It is also good to log into your wifi router and see the connections and logs that are left behind. (I bought the D-Link Wireless N Router.Read more ›
Personally, I did some stuff before this. I have v.little experience on Linux, created my bt5 live cd, learnt how to monitor my wireless nic, send de-auths, capture .pcap files and use the dictionary attack on them. It took me a good 4-5 hours or so of googling & running into problems and fixing them.
If I had this book it would have saved me these hours searching how to do things so I wish I had it before I played with bt5. Anyway, I'm half way through the book & I'd say that if you can do what I just described then you already know 40% of whats in the book (add another 10% if you know how to do it for WEP). Looks like the upcoming chapters might be have a few cool things though with mis-association atttacks & man in the middle.
Wouldn't recommend this book for anyone but proper begineers. But that's exactly what the book was aimed to do - hence the title.
All the tests laid out in a great step by step fashion. Beware though, some of the instructions for WPA2 Enterprise will need Internet research if building Freeradius-WPE on Kali which does strange things.
Starting from the basics on setting up a lab, the book goes through the different types of wireless technologies, their benefits and weaknesses and more importantly how to detect those weaknesses. For each of the chapters you learn about the basics and how the technology works along with a step by step walk through example of how to do this yourself.
Going through most of the exercises I truly felt that this was on par with a real instructor led classroom learning. Billed as a beginners book, I'm sure that even if you are a beginner, by the time you've gone through this book once you'll feel anything but one!
Vivek pitches the information at the right level to help people start in this topic before
moving on to more complex topics.
I would definitely recommend this book.
This book is highly technical & written completely from practical perspective. To get the best out of this book you need to parallely follow it up with your own setup as shown in first chapter. And at the end of it, there will be one more Wi-Fi ninja in the air.
Here is the complete chapter by chapter review,
First chapter starts with the famous line from `Abraham Lincoln' pressing on the importance of setting up the play ground,
"If I had eight hours to chop down a tree, I'd spend six hours sharpening my axe."
It lists both hardware/software requirements with 2 Wi-Fi enabled laptops, one injectible Wi-Fi card (Alfa AWUS036H) & a access point. Some more listing of alternative injectible Wi-Fi cards would have been better though. It is often difficult to get the right one especially for those who are outside USA/UK. In my initial days of wardriving, I remember waiting for entire year to get my first injectible USB dongle. And without the right card, you are on the back foot as you can't perform most of the attacks.
Remaining portion of first chapter shows how to install BackTrack, Setting up access point and wireless cards in detail with screenshots. Next one explains in brief about wireless frames and shows how to capture the Wi-Fi packets in the air and inject your own packets using Alfa card.
It goes more interesting with chapter 3 showing how to bypass various wireless security restrictions such as hidden SSIDs, defeating MAC filters, bypassing WEP authentication etc. Next it shows how to really crack those 128 bit WEP keys using aircrack-ng tool.Read more ›
Most Recent Customer Reviews
It certainly makes you realise how vulnerable wireless access really is and makes you think what's the best methods to make your wireless more secure. Read morePublished on 10 Jun. 2012 by finneysan
Purchased this book with intention to update my skill levels & check on the security of my system.
The easy steps that this book guides you along soon have testing the live... Read more
Bought this book a couple of weeks ago, very recommended for those who are a bit shakey with Linux and need to know more about Wi-Fi security.Published on 15 Nov. 2011 by M. Aiash
This book must surely have been written with a subversive gleam in Ramachandran's eye. It is the equivalent of the Anarchist's Handbook from the 1960s. Read morePublished on 23 Oct. 2011 by W Boudville
Wow - i just could not put this book down. I have never had so much fun with a book since i last flicked through the pages of Razzle Readers Wives whilst sitting in central... Read morePublished on 17 Oct. 2011 by nicko