BackTrack – Testing Wireless Network Security
Installing and Configuring BackTrack
Downloading and configuring BackTrack
Working with the Wireless Card
Detecting the wireless card during the boot process
Detecting the wireless card using iwconfig
Protocol analysis with the network card
Using Kismet for access point discovery
Discovering hidden access points
Performing an attack using WEP and ChopChop
Securing Your Wireless Network
Configuring initial wireless security
Settings that provide protection from masquerade and rogue AP attacks