Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
BackTrack – Testing Wireless Network Security
Table of Contents BackTrack – Testing Wireless Network Security Credits About the Author About the Reviewers www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe? Free Access for Packt account holders
Preface
What this book covers What you need for this book Who this book is for Conventions Reader feedback Customer support
Downloading the example code Errata Piracy Questions
1. Installing and Configuring BackTrack
Downloading and configuring BackTrack Installing BackTrack Updating BackTrack Validating the interfaces Customizing Gnome
New wave theme
Creating a virtual machine Summary
2. Working with the Wireless Card
Checking card compatibility Detecting the wireless card during the boot process Detecting the wireless card using iwconfig Configuring the wireless card Wireless card modes Protocol analysis with the network card Summary
3. Surveying Your Wireless Zone
Exploring devices Working with tools Using Kismet for access point discovery Discovering hidden access points Summary
4. Breaching Wireless Security
Different types of attacks Cracking WEP and WPA Performing an attack using WEP and ChopChop Summary
5. Securing Your Wireless Network
Configuring initial wireless security Defending from surveillance Configuring encryption Settings that provide protection from masquerade and rogue AP attacks Summary
A. Wireless Tools Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion