All you need is some experience with networks and computers and you will be ready to go. Table of Contents BackTrack — Testing Wireless Network Security Credits About the Author About the Reviewers www. Don't let it happen to you. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more. You will learn everything you need to know to set up your wireless network for use within Backtrack and also how to defend yourself against the included attack tools.
Please read our description and our privacy and policy page. Installing and Configuring BackTrack Downloading and configuring BackTrack Installing BackTrack Updating BackTrack Validating the interfaces Customizing Gnome New wave theme Creating a virtual machine Summary 2. He is also an active contributor to the SecurityXploded community. You will require the BackTrack distribution. Note: We cannot guarantee that every book is in the library. Woody Abhinav Singh Arif Jatmoko Lee Allen Acquisition Editors Martin Bell Erol Staveley Commissioning Editor Yogesh Dalvi Technical Editor Nitee Shetty Copy Editors Brandt D'Mello Insiya Morbiwala Alfida Paiva Laxmi Subramanian Project Coordinator Joel Goveya Proofreader Clyde Jenkins Indexer Tejal R. As was mentioned in the previous chapter, it is difficult to prevent this because we need to have our networks available.
However, the information contained in this book is sold without warranty, either express or implied. Woody is a security consultant with over 15 years of experience in Information Technology, with a focus on security. You will also need virtualization software products. With Safari, you learn the way you learn best. Cancel the membership at any time if not satisfied.
The steps for its installation and configuration are included within the book. Register a free 1 month Trial Account. Prior to joining the bank, Arif had spent over 15 years working as a computer security specialist, computer forensicist, and malware analyst. Get in touch with us at for more details. With Safari, you learn the way you learn best. He can be reached by mail at or on Twitter at abhinavbom.
Now that we have discussed this process and methodology, we will look at securing our wireless networks from attacks. BackTrack: Testing Wireless Network Security will help you secure your wireless networks and keep your personal data safe. All you need is some experience with networks and computers and you will be ready to go. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks. Wireless Tools Index BackTrack — Testing Wireless Network Security BackTrack — Testing Wireless Network Security Copyright © 2013 Packt Publishing All rights reserved. Free Access for Packt account holders Preface What this book covers What you need for this book Who this book is for Conventions Reader feedback Customer support Downloading the example code Errata Piracy Questions 1. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.
He is a speaker and an active instructor, teaching hacking, forensics, and information security. Taking you from no prior knowledge all the way to a fully secure environment, this guide provides useful tips every step of the way. With this book, you will learn how to configure your hardware for optimum security, find network security holes, and fix them. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? Configuring initial wireless security In the last chapter, we discussed how an attacker can break into a wireless network. Mohite Cover Work Nilesh R. With this book, you will learn how to configure your hardware for optimum security, find network security holes, and fix them.
Working with the Wireless Card Checking card compatibility Detecting the wireless card during the boot process Detecting the wireless card using iwconfig Configuring the wireless card Wireless card modes Protocol analysis with the network card Summary 3. . With your data being transferred over the air, it can be easily plucked and used by anyone who knows how. Lee Allen is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide, Packt Publishing. The first steps in the methodology that we discussed were probing and network discovery. About the Reviewers Aaron M.
Now, he is working on a research about protocol reverse- engineering related to application systems within financial transactions such as banking. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. Use the tools aircrack-ng and airodump-ng to crack the wireless encryption used on the network. All you need is some experience with networks and computers and you will be ready to go. In the majority of cases, the default settings for your networks are not enough to protect you. BackTrack: Testing Wireless Network Security looks at what tools hackers use and shows you how to defend yourself against them. He is the author of Metasploit Penetration Testing Cookbook, Packt Publishing, a book dealing with pen-testing using the most widely -used framework.