• Complain

Kevin Cardwell - BackTrack - Testing Wireless Network Security

Here you can read online Kevin Cardwell - BackTrack - Testing Wireless Network Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2013, publisher: Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Kevin Cardwell BackTrack - Testing Wireless Network Security
  • Book:
    BackTrack - Testing Wireless Network Security
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2013
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

BackTrack - Testing Wireless Network Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "BackTrack - Testing Wireless Network Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

BackTrack - Testing Wireless Network Security looks at what tools hackers use and shows you how to defend yourself against them. Taking you from no prior knowledge all the way to a fully secure environment, this guide provides useful tips every step of the way. Learn how to select a wireless card to work with the Backtrack tools, run spectrum analysis scans using kismet, set up test networks, and perform attacks against wireless networks. Use the tools aircrack-ng and airodump-ng to crack the wireless encryption used on the network.

Kevin Cardwell: author's other books


Who wrote BackTrack - Testing Wireless Network Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

BackTrack - Testing Wireless Network Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "BackTrack - Testing Wireless Network Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
BackTrack Testing Wireless Network Security

BackTrack Testing Wireless Network Security

Copyright 2013 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

First published: June 2013

Production Reference: 1180613

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham B3 2PB, UK.

ISBN 978-1-78216-406-7

www.packtpub.com

Cover Image by Vivek Sinha (<>)

Credits

Author

Kevin Cardwell

Reviewers

Aaron M. Woody

Abhinav Singh

Arif Jatmoko

Lee Allen

Acquisition Editors

Martin Bell

Erol Staveley

Commissioning Editor

Yogesh Dalvi

Technical Editor

Nitee Shetty

Copy Editors

Brandt D'Mello

Insiya Morbiwala

Alfida Paiva

Laxmi Subramanian

Project Coordinator

Joel Goveya

Proofreader

Clyde Jenkins

Indexer

Tejal R. Soni

Production Coordinator

Nilesh R. Mohite

Cover Work

Nilesh R. Mohite

About the Author

Kevin Cardwell currently works as a freelance consultant and provides consulting services for companies throughout the world. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman and also developed the team to man the first Commercial Security Operations Center there. He has worked extensively with banks and financial institutions throughout the Middle East, Africa, Europe, and the UK. He currently provides consultancy services to commercial companies, governments, major banks, and financial institutions across the globe.

About the Reviewers

Aaron M. Woody is a security consultant with over 15 years of experience in Information Technology, with a focus on security. He is a speaker and an active instructor, teaching hacking, forensics, and information security. In addition to this, he has been a technical reviewer on several titles published by Packt Publishing . Aaron maintains two blogs: www.n00bpentesting.com and www.datacentricsec.com. Aaron can also be followed on Twitter at @shai_saint.

Aaron is the author of Enterprise Security: A Data-Centric Approach to Securing the Enterprise , Packt Publishing .

Abhinav Singh is a young information security specialist from India. He has a keen interest in the field of hacking and network security and has adopted this field as full-time employment. He is the author of Metasploit Penetration Testing Cookbook , Packt Publishing , a book dealing with pen-testing using the most widely -used framework. Abhinav's work has been quoted in several portals and technology magazines. He is also an active contributor to the SecurityXploded community. He can be reached by mail at <> or on Twitter at @abhinavbom.

I would like to thank my grandparents for their blessings, my parents for their support, and my sister for being my perfect doctor.

Arif Jatmoko (MKom, CISSP, CISA, CCSP, CEH) is an IT Security Auditor at Bank Mandiri, Indonesia, and a private pentester for a few government projects. Prior to joining the bank, Arif had spent over 15 years working as a computer security specialist, computer forensicist, and malware analyst. From the early stages of his career, he has been working with top Fortune 500 companies as an IT security officer and has run several pentest projects for government and military institutions.

Now, he is working on a research about protocol reverse- engineering related to application systems within financial transactions such as banking.

Lee Allen is currently the Vulnerability Management Program lead for one of the Fortune 500 countries.

Lee is also the owner of miDgames.com, which is dedicated to bridging the gap between learning and fun by providing 3D video games that teach and reinforce complex subjects such as Linux command-line and penetration-testing skills.

Lee Allen is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide , Packt Publishing .

www.PacktPub.com
Support files, eBooks, discount offers and more

You might want to visit www.PacktPub.com for support files and downloads related to your book.

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at > for more details.

At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.

httpPacktLibPacktPubcom Do you need instant solutions to your IT - photo 1

http://PacktLib.PacktPub.com

Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books.

Why Subscribe?
  • Fully searchable across every book published by Packt
  • Copy and paste, print and bookmark content
  • On demand and accessible via web browser
Free Access for Packt account holders

If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.

This book is dedicated to Loredana for all of her support and understanding during the many nights of research and writing. Thank you.

Preface

This book is for the reader who wants to understand more about their wireless network, and how to use a software distribution such as BackTrack to be able to survey their wireless environment and select a robust and secure configuration.

What this book covers

, Installing and Configuring BackTrack , shows the reader how to install, configure, and customize BackTrack. At the end of this chapter, the reader will have a working and customized BackTrack application.

, Working with the Wireless Card , shows the reader how to work with the configuration and deal with the sometimes challenging task of getting their wireless card to work within BackTrack. At the end of this chapter, you will have a wireless card that works with the tools within BackTrack.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «BackTrack - Testing Wireless Network Security»

Look at similar books to BackTrack - Testing Wireless Network Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «BackTrack - Testing Wireless Network Security»

Discussion, reviews of the book BackTrack - Testing Wireless Network Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.