Book Review: BackTrack 5 Wireless Penetration Testing Beginner’s Guide
If you want an easy to follow, step by step guide to analyzing and testing Wi-Fi security, look no further than Vivek Ramachandran’s “Backtrack 5 Wireless Penetration Testing Beginner’s Guide”.
The author masterfully guides you on a path from the basic principles of Wi-Fi to advanced monitoring and attacks.
Vivek starts you out by preparing your wireless lab, installing Backtrack 5, configuring your wireless cards and access point.
Then after a brief overview of wireless frames, you get to work right away by sniffing traffic with Wireshark so you can see what these frames actually look like.
But that is just the beginning.
The author then takes you on a step by step journey of the most common attacks used against WLANs. This includes everything from bypassing authentication & cracking encryption, to advanced techniques like man-in-the-middle attacks and attacking WPA-Enterprise. He then finishes the book with discussing Wireless penetration methodology, testing and reporting.
It has been a while since I have seen a book like this. You will learn step by step, command by command, using the ever popular penetration testing platform Backtrack 5. Each chapter builds on what you have learned in the previous. The text is very clear to follow and the pictures perfectly display and clarify the techniques you are learning.
For best results, you should have at least a basic knowledge of Linux or Backtrack 5 and Wi-Fi.
If you are interested in computer security, and want to learn how Wireless networks are attacked and how to defend against it, then look no further. I highly recommend this book.
* I had the absolute honor of working on this project as a technical editor for Packt Publishing. Vivek is an exceptional person with a deep passion for sharing his knowledge of IT security.
He was one of the winners of Microsoft’s Security Shootout contest in India, worked at Cisco as an Engineer, founded SecurityTube.net, discovered the wireless “Caffe Latte Attack” and presented at numerous security conferences including Blackhat, Defcon and Toorcon.