BackTrack - Testing Wireless Network Security BackTrack - Testing Wireless Network Security discussion


9 views
Backtrack 5 - Testing Wireless Network Security

Comments Showing 1-3 of 3 (3 new)    post a comment »
dateUp arrow    newest »

message 1: by Mat (new)

Mat Powell One of my favorite penetration tests is the wireless assessment. Backtrack 5 - Testing Wireless Security builds upon another of Packt’s books BackTrack 5 Wireless Penetration Testing Beginners Guide in going a little more in depth of wireless penetration techniques. The book is short, sweet, and to the point at a commanding 108 pages and about 5 chapters (2 on setup, 2 on discovery/exploitation, and 1 on ensuring you’re adhering to best practices for securing your network)

As a command line fanboy, one thing I wish this book covered more of was the use of the Aircrack-NG suite of tools from the command line. While there are some GUI tools out there (and this book covers them), I would still recommend that users get familiar with these tools as they are still the best in this space.

Overall, I’d recommend this book to someone new to wireless assessments.

You can read more about the book here: http://www.packtpub.com/backtrack-tes....


message 2: by Mohit (new)

Mohit Raj Good Points

1. Good description of installing Wireless card in VMware.
2. Snap Shots are good to present result.
3. Book include "Reaver" which is also good point.
4. Language is easy to understand.
5. Book includes Tools description at the last is very impressive.

Points should be take into Account

1. Back Track can be run by using Pen drive.
2. Reaver description is very low, After lots of discussion on Linked in http://www.linkedin.com/groupItem?vie...

i found the reaver is working on Old wireless router which has vulnerability of WPS.

3. No description on Packet de-authentication attack, which is very serious.

4. Include some other tools which is used to detect the rouge access points like Net Surveyor.

comm view is very good tools for packet capturing in order to do WEP breaking.

5. Some description about how to detect DHCP Starvation attack .


in case you need any help kindly contact me on same


message 3: by Yusup (new)

Yusup Cabulao Concise and vividly explains presumably the exertion on the part of the user or network administrator on testing and figuring out the weaknesses of his wireless network utilizing the various and favorable wireless security tools found in Backtrack 5 R3 release and eventually securing the network by not neglecting the best practices of doing it right. The scenario is somehow objectively done in a virtualization environment using the trial version of VMware Workstation version 9 however it can also be done in other virtualization applications like the oracle VirtualBox in which I personally prefer to use. This is a great book because it clearly points out basically the fundamental issues from installing BackTrack, configuring it to your liking, selecting wireless card to work with BackTrack, familiarizing the wireless tools and protecting your wireless network from the malicious intent of the attackers. If you buy this book, I hope you learn something and enjoy reading it as much as I do.


back to top