封面
版权信息
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Chapter 1. Installing and Configuring BackTrack
Downloading and configuring BackTrack
Installing BackTrack
Updating BackTrack
Validating the interfaces
Customizing Gnome
Creating a virtual machine
Summary
Chapter 2. Working with the Wireless Card
Checking card compatibility
Detecting the wireless card during the boot process
Detecting the wireless card using iwconfig
Configuring the wireless card
Wireless card modes
Protocol analysis with the network card
Summary
Chapter 3. Surveying Your Wireless Zone
Exploring devices
Working with tools
Using Kismet for access point discovery
Discovering hidden access points
Summary
Chapter 4. Breaching Wireless Security
Different types of attacks
Cracking WEP and WPA
Performing an attack using WEP and ChopChop
Summary
Chapter 5. Securing Your Wireless Network
Configuring initial wireless security
Defending from surveillance
Configuring encryption
Settings that provide protection from masquerade and rogue AP attacks
Summary
Appendix A. Wireless Tools
Index
更新时间:2021-08-13 17:01:47