Book Image

BackTrack - Testing Wireless Network Security

By : Kevin Cardwell
Book Image

BackTrack - Testing Wireless Network Security

By: Kevin Cardwell

Overview of this book

Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In the majority of cases, the default settings for your networks are not enough to protect you. With your data being transferred over the air, it can be easily plucked and used by anyone who knows how. Don't let it happen to you.BackTrack - Testing Wireless Network Security will help you secure your wireless networks and keep your personal data safe. With this book, you will learn how to configure your hardware for optimum security, find network security holes, and fix them.BackTrack - Testing Wireless Network Security looks at what tools hackers use and shows you how to defend yourself against them. Taking you from no prior knowledge all the way to a fully secure environment, this guide provides useful tips every step of the way. Learn how to select a wireless card to work with the Backtrack tools, run spectrum analysis scans using kismet, set up test networks, and perform attacks against wireless networks. Use the tools aircrack-ng and airodump-ng to crack the wireless encryption used on the network. You will learn everything you need to know to set up your wireless network for use within Backtrack and also how to defend yourself against the included attack tools.
Table of Contents (13 chapters)

About the Reviewers

Aaron M. Woody is a security consultant with over 15 years of experience in Information Technology, with a focus on security. He is a speaker and an active instructor, teaching hacking, forensics, and information security. In addition to this, he has been a technical reviewer on several titles published by Packt Publishing. Aaron maintains two blogs: www.n00bpentesting.com and www.datacentricsec.com. Aaron can also be followed on Twitter at @shai_saint.

Aaron is the author of Enterprise Security: A Data-Centric Approach to Securing the Enterprise, Packt Publishing.

Abhinav Singh is a young information security specialist from India. He has a keen interest in the field of hacking and network security and has adopted this field as full-time employment. He is the author of Metasploit Penetration Testing Cookbook, Packt Publishing, a book dealing with pen-testing using the most widely -used framework. Abhinav's work has been quoted in several portals and technology magazines. He is also an active contributor to the SecurityXploded community. He can be reached by mail at or on Twitter at @abhinavbom.

Arif Jatmoko (MKom, CISSP, CISA, CCSP, CEH) is an IT Security Auditor at Bank Mandiri, Indonesia, and a private pentester for a few government projects. Prior to joining the bank, Arif had spent over 15 years working as a computer security specialist, computer forensicist, and malware analyst. From the early stages of his career, he has been working with top Fortune 500 companies as an IT security officer and has run several pentest projects for government and military institutions.

Now, he is working on a research about protocol reverse- engineering related to application systems within financial transactions such as banking.

Lee Allen is currently the Vulnerability Management Program lead for one of the Fortune 500 countries.

Lee is also the owner of miDgames.com, which is dedicated to bridging the gap between learning and fun by providing 3D video games that teach and reinforce complex subjects such as Linux command-line and penetration-testing skills.

Lee Allen is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide, Packt Publishing.