About the Reviewers
Aaron M. Woody is a security consultant with over 15 years of experience in Information Technology, with a focus on security. He is a speaker and an active instructor, teaching hacking, forensics, and information security. In addition to this, he has been a technical reviewer on several titles published by Packt Publishing . Aaron maintains two blogs: www.n00bpentesting.com and www.datacentricsec.com. Aaron can also be followed on Twitter at @shai_saint
.
Aaron is the author of Enterprise Security: A Data-Centric Approach to Securing the Enterprise , Packt Publishing .
Abhinav Singh is a young information security specialist from India. He has a keen interest in the field of hacking and network security and has adopted this field as full-time employment. He is the author of Metasploit Penetration Testing Cookbook , Packt Publishing , a book dealing with pen-testing using the most widely -used framework. Abhinav's work has been quoted in several portals and technology magazines. He is also an active contributor to the SecurityXploded community. He can be reached by mail at <>
or on Twitter at @abhinavbom
.
I would like to thank my grandparents for their blessings, my parents for their support, and my sister for being my perfect doctor.
Arif Jatmoko (MKom, CISSP, CISA, CCSP, CEH) is an IT Security Auditor at Bank Mandiri, Indonesia, and a private pentester for a few government projects. Prior to joining the bank, Arif had spent over 15 years working as a computer security specialist, computer forensicist, and malware analyst. From the early stages of his career, he has been working with top Fortune 500 companies as an IT security officer and has run several pentest projects for government and military institutions.
Now, he is working on a research about protocol reverse- engineering related to application systems within financial transactions such as banking.
Lee Allen is currently the Vulnerability Management Program lead for one of the Fortune 500 countries.
Lee is also the owner of miDgames.com, which is dedicated to bridging the gap between learning and fun by providing 3D video games that teach and reinforce complex subjects such as Linux command-line and penetration-testing skills.
Lee Allen is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide , Packt Publishing .
www.PacktPub.com
Support files, eBooks, discount offers and more
You might want to visit www.PacktPub.com for support files and downloads related to your book.
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at > for more details.
At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
http://PacktLib.PacktPub.com
Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books.
Why Subscribe?
- Fully searchable across every book published by Packt
- Copy and paste, print and bookmark content
- On demand and accessible via web browser
Free Access for Packt account holders
If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.
This book is dedicated to Loredana for all of her support and understanding during the many nights of research and writing. Thank you.
Preface
This book is for the reader who wants to understand more about their wireless network, and how to use a software distribution such as BackTrack to be able to survey their wireless environment and select a robust and secure configuration.
What this book covers
, Installing and Configuring BackTrack , shows the reader how to install, configure, and customize BackTrack. At the end of this chapter, the reader will have a working and customized BackTrack application.
, Working with the Wireless Card , shows the reader how to work with the configuration and deal with the sometimes challenging task of getting their wireless card to work within BackTrack. At the end of this chapter, you will have a wireless card that works with the tools within BackTrack.