Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
BackTrack 5 Wireless Penetration Testing Beginner's Guide
BackTrack 5 Wireless Penetration Testing Beginner's Guide

BackTrack 5 Wireless Penetration Testing Beginner's Guide: Master bleeding edge wireless testing techniques with BackTrack 5.

Arrow left icon
Profile Icon Vivek Ramachandran
Arrow right icon
₱2806.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.2 (75 Ratings)
Paperback Sep 2011 220 pages 1st Edition
eBook
₱579.99 ₱2245.99
Paperback
₱2806.99
Subscription
Free Trial
Arrow left icon
Profile Icon Vivek Ramachandran
Arrow right icon
₱2806.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.2 (75 Ratings)
Paperback Sep 2011 220 pages 1st Edition
eBook
₱579.99 ₱2245.99
Paperback
₱2806.99
Subscription
Free Trial
eBook
₱579.99 ₱2245.99
Paperback
₱2806.99
Subscription
Free Trial

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Table of content icon View table of contents Preview book icon Preview Book

BackTrack 5 Wireless Penetration Testing Beginner's Guide

Chapter 2. WLAN and Its Inherent Insecurities

Note

"The loftier the building, the deeper the foundation must be laid."

Thomas Kempis, Writer

Nothing great can be built on a weak foundation, and in our context, nothing secure can be built on something which is inherently insecure.

WLANs by design have certain insecurities which are relatively easy to exploit, such as packet spoofing, packet injection, and sniffing (which could even happen from far away). We will explore those flaws in this chapter.

In this chapter, we will look at the following:

  • Revisiting WLAN frames

  • Different frame types and sub-types

  • Using Wireshark to sniff Management, Control, and Data frames

  • Sniffing data packets for a given wireless network

  • Injecting packets into a given wireless network

Let's get started!

Revisiting WLAN frames


As this book deals with the security aspects of Wireless network, we will assume that you already have a basic understanding of the protocol and the packet headers. If not or if it's been some time since you worked on wireless network, this would be a good time to revisit it again.

Let us now quickly review some basic concepts of WLANs which most of you may already be aware of. In WLANs, communication happens over frames. A frame would have the following header structur:

The "Frame Control" field itself has a more complex structue:

The Type field defines the type of WLAN frame, which has three possibilities:

  1. Management frames: Management frames are responsible for maintaining communication between the access points and wireless clients. The Management frames can have the following sub-types:

    • Authentication

    • De-authentication

    • Association Request

    • Association Response

    • Reassociation Request

    • Reassociation Response

    • Disassociation

    • Beacon

    • Probe Request

    • Probe Response

  2. Control frames:...

Time for action – creating a monitor mode interface


Let's now set our Alfa card into monitor mode!

Follow these instructions to get started:

  1. Boot into BackTrack with your Alfa card connected. Once you are within the console, enter iwconfig to confirm that your card has been detected and the driver has been loaded properly:

  2. Use the ifconfig wlan0 up command to bring the card up. Verify the card is up by running ifconfig wlan0. You should see the word UP in the second line of the output as shown:

  3. To put our card into monitor mode, we will use the airmon-ng utility which is available by default on BackTrack. First run airmon-ng to verify it detects the available cards. You should see the wlan0 interface listed in the output:

  4. Now enter airmon-ng start wlan0 to create a monitor mode interface corresponding to the wlan0 device. This new monitor mode interface will be named mon0. You can verify it has been created by running airmon-ng without arguments again:

  5. Also, running ifconfig should now display...

Time for action – sniffing wireless packets


Follow these instructions to begin sniffing packets:

  1. Power up our access point Wireless Lab which we configured in Chapter 1, Wireless Lab Setup.

  2. Start Wireshark by typing Wireshark& in the console. Once Wireshark is running, click on the Capture | Interfaces sub-menu:

  3. Select packet capture from the mon0 interface by clicking on the Start button to the right of the mon0 interface as shown in the preceding screenshot. Wireshark will begin the capture and now you should see packets within the Wireshark window:

  4. These are wireless packets which your Alfa Wireless card is sniffing off the air. In order to view any packet, select it in the top window and the entire packet will be displayed in the middle window:

  5. Click on triangle in front of IEEE 802.11 wireless LAN management frame to expand and view additional information.

  6. Look at the different header fields in the packet and correlate them with the WLAN frame types and sub-types you have learned earlier...

Time for action – viewing Management, Control, and Data frames


Now we will learn how to apply filters in Wireshark to look at management, control, and data frames.

Please follow these instructions step-by-step:

  1. To view all the Management frames in the packets being captured, enter the filter wlan.fc.type == 0 into the filter window and click on Apply. You can stop the packet capture if you want to prevent the packets from scrolling down too fast:

  2. To view Control Frames, modify the filter expression to read wlan.fc.type == 1:

  3. To view the Data Frames, modify the filter expression to wlan.fc.type == 2:

  4. To additionally select a sub-type, use the wlan.fc.subtype filter. For example, to view all the Beacon frames among all Management frames use the following filter (wlan.fc.type == 0) && (wlan.fc.subtype == 8).

  5. Alternatively, you can right-click on any of the header fields in the middle window and then select Apply as Filter | Selected to add it as a filter:

  6. This will automatically add the correct...

Time for action – sniffing data packets for our network


In this exercise, we will learn how to sniff Data packets for a given wireless network. For the sake of simplicity, we will look at packets without any encryption.

Follow these instructions to get started:

  1. Switch on the access point we had named Wireless Lab. Let it remain configured to use no encryption.

  2. We will first need to find the channel on which the Wireless Lab access point is running on. To do this, open a terminal and run airodump-ng --bssid 00:21:91:D2:8E:25 mon0 where 00:21:91:D2:8E:25 is the MAC address of our access point. Let the program run, and shortly you should see your access point shown on the screen along with the channel it is running on:

  3. We can see from the preceding screenshot that our access point Wireless Lab is running on Channel 11. Note that this may be different for your access point.

  4. In order to sniff data packets going to and fro from this access point, we need to lock our wireless card on the same channel...

Time for action – packet injection


We will be using the aireplay-ng tool which is available in BackTrack for this exercise.

Follow these instructions carefully:

  1. In order to do an injection test, first start Wireshark and the filter expression (wlan.bssid == 00:21:91:d2:8e:25) && !(wlan.fc.type_subtype == 0x08). This will ensure that we only see non-beacon packets for our lab network.

  2. Now run the following command aireplay-ng -9 -e Wireless Lab -a 00:21:91:d2:8e:25 mon0 on a terminal:

  3. Go back to Wireshark and you should see a lot of packets on the screen now. Some of these packets have been sent by aireplay-ng which we launched, and others are from the access point Wireless Lab in response to the injected packets:

What just happened?

We just successfully injected packets into our test lab network using aireplay-ng. It is important to note that our card injected these arbitrary packets into the network without actually being connected to the access point Wireless Lab.

Have a go hero –...

Important note on WLAN sniffing and injection


WLANs typically operate within three different frequency ranges—2.4 GHz, 3.6 GHz, and 4.9/5.0 GHz. Not all Wi-Fi cards support all these ranges and associated bands. As an example, the Alfa card, which we are using, only supports IEEE 802.11b/g. This would mean this card cannot operate in 802.11a/n. The key point here is that to sniff or inject packets in a particular band, your Wi-Fi card will need to support it.

Another interesting aspect of Wi-Fi is that in each of these bands, there are multiple channels. It is important to note that your Wi-Fi card can only be on one channel at any given moment. It is not possible to tune into multiple channels at the same time. The analogy I can give you is your car radio. You can tune it to only one of the available channels at any given time. If you want to hear something else, you will have to change the channel of the radio. The same principle applies to WLAN sniffing. This brings us to an important...

Time for action – expermenting with your Alfa card


Follow the instructions carefully:

  1. Enter the iwconfig wlan0 command to check the capabilities of your card. As you can see in the following screenshot, the Alfa card can operate in the b and g bands:

  2. Just for demo purposes, when I connect another card, a D-Link DWA-125, we see that it is capable for b, g, and n bands:

  3. To set the card on a particular channel we use the iwconfig mon0 channel X commands:

  4. The iwconfig series of commands does not have a channel hopping mode. One could write a simple script over it to make it do so. An easier way is to use airodump-ng with options to either hop channels arbitrarily or only a subset or only selected bands. All these options are illustrated in the following screenshot when we run airodump-ng –help:

What just happened?

We understood that both wireless sniffing and packet injection depend on the hardware support available. This would mean that we can only operate on bands and channels allowed by our...

Role of regulatory domains in wireless


The complexities of Wi-Fi don't end here. Every country has its own unlicensed spectrum allocation policy. This specifically dictates allowed power levels and allowed users for the spectrum. In the US, for example, the FCC decides this and if you use WLANs in the US you have to abide by these regulations. In some countries, not doing so is a punishable offense.

Now let us look at how we can find the default regulatory settings and then how to change them if required.

Time for acton – experimenting with your Alfa card


Perform the following steps:

  1. Reboot your computer and do not connect your Alfa card to it yet.

  2. Once logged in, monitor the kernel messages using the tail command:

  3. Insert the Alfa card, you should see something which resembles the following screenshot. This is the default regulatory settings applied to your card:

  4. Let's assume that you are based in the US. To change your regulatory domain to the US, we issue the command iw reg set US in a new terminal:

  5. If the command is successful, we get an output as shown (in the following screenshot) in the terminal where we are monitoring /var/log/messages:

  6. Now try, changing the card to channel 11, it would work. But when you try changing it to channel 12, you get a error. This is because channel 12 is not allowed for use in the US:

  7. The same applies for power levels. The US only allows a maximum of 27dBm (500 milliwatts), so even though the Alfa card has an advertised power of 1 Watt (30 dBm), we cannot set...

Summary


In this chapter, we have made some key observations about WLAN protocols:

Management, Control, and Data frames are unencrypted and thus can be easily read by someone who is monitoring the air space. It is important to note here that the data packet payload can be protected using encryption to keep it confidential. We will talk about this in the next chapter.

We can sniff the entire airspace in our vicinity by putting our card into monitor mode.

As there is no integrity protection in Management and Control frames, it is very easy to inject these packets by modifying them or replaying them as is using tools such as aireplay-ng.

Unencrypted data packets can also be modified and replayed back to the network. If the packet is encrypted, we can still replay the packet as-is, as WLAN by design does not have packet replay protection.

In the next chapter, we will look at different authentication mechanisms which are used in WLANs such as MAC Filtering, Shared Authentication, and so on, and understand...

Left arrow icon Right arrow icon

Key benefits

  • Learn Wireless Penetration Testing with the most recent version of Backtrack
  • The first and only book that covers wireless testing with BackTrack
  • Concepts explained with step-by-step practical sessions and rich illustrations
  • Written by Vivek Ramachandran ¬¨‚Äì world renowned security research and evangelist, and discoverer of the wireless ‚ÄúCaffe Latte Attack‚Äù

Description

Wireless has become ubiquitous in today’s world. The mobility and flexibility provided by it makes our lives more comfortable and productive. But this comes at a cost – Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of wireless networking tools used to simulate network attacks and detect security loopholes. Backtrack 5 Wireless Penetration Testing Beginner’s Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks.This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions in wireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab.There are many interesting and new things that you will learn in this book – War Driving, WLAN packet sniffing, Network Scanning, Circumventing hidden SSIDs and MAC filters, bypassing Shared Authentication, Cracking WEP and WPA/WPA2 encryption, Access Point MAC spoofing, Rogue Devices, Evil Twins, Denial of Service attacks, Viral SSIDs, Honeypot and Hotspot attacks, Caffe Latte WEP Attack, Man-in-the-Middle attacks, Evading Wireless Intrusion Prevention systems and a bunch of other cutting edge wireless attacks.If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker.

Who is this book for?

If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

What you will learn

  • Create a Wireless Lab for conducting experiments
  • Monitor the air and sniff wireless packets
  • Bypass WLAN authentication mechanism
  • Crack WEP/WPA/WPA2 encryption mechanisms
  • Break into a WLAN network using infrastructure flaws
  • Break into a Wireless client such as a laptop
  • Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS
  • Conduct wireless penetration test in a methodical way
Estimated delivery fee Deliver to Philippines

Standard delivery 10 - 13 business days

₱492.95

Premium delivery 5 - 8 business days

₱2548.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Sep 09, 2011
Length: 220 pages
Edition : 1st
Language : English
ISBN-13 : 9781849515580
Category :
Tools :

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Estimated delivery fee Deliver to Philippines

Standard delivery 10 - 13 business days

₱492.95

Premium delivery 5 - 8 business days

₱2548.95
(Includes tracking information)

Product Details

Publication date : Sep 09, 2011
Length: 220 pages
Edition : 1st
Language : English
ISBN-13 : 9781849515580
Category :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₱260 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₱260 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 8,981.97
BackTrack 5 Wireless Penetration Testing Beginner's Guide
₱2806.99
Metasploit Penetration Testing Cookbook
₱2806.99
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
₱3367.99
Total 8,981.97 Stars icon
Banner background image

Table of Contents

9 Chapters
Wireless Lab Setup Chevron down icon Chevron up icon
WLAN and Its Inherent Insecurities Chevron down icon Chevron up icon
Bypassing WLAN Authentication Chevron down icon Chevron up icon
WLAN Encryption Flaws Chevron down icon Chevron up icon
Attacks on the WLANInfrastructure Chevron down icon Chevron up icon
Attacking the Client Chevron down icon Chevron up icon
Advanced WLAN Attacks Chevron down icon Chevron up icon
Attacking WPA-Enterprise and RADIUS Chevron down icon Chevron up icon
WLAN Penetration Testing Methodology Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.2
(75 Ratings)
5 star 68%
4 star 13.3%
3 star 4%
2 star 4%
1 star 10.7%
Filter icon Filter
Top Reviews

Filter reviews by




Make War Oct 03, 2014
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Excellent
Amazon Verified review Amazon
GK Feb 28, 2012
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book should be a template for how other tech books should be written; to the point and full of useful (real world) examples and exercises. Another great thing about this book (in my experience) was that it did not assume too much or too little knowledge on the subject from me. Just enough for beginners to start with and build throughout the book, and enough for anyone not an expert on the subject to learn from.Highly Recommended.
Amazon Verified review Amazon
Seth Sep 26, 2011
Full star icon Full star icon Full star icon Full star icon Full star icon 5
An amazing book. This one wastes no time with a long pre-amble or justifying why you'd need to know how to pen-test; it just tells you what you need to know. You're sniffing wireless traffic right from the start, injecting packets by page 40 or so, and then you're off spoofing MAC addreses, cracking WPA (even shared authentication), and doing man-in-the-middle attacks.This is not a book that explains a lot of theory and then expects you to figure out how to apply it. It's a finely-tuned set of clear, intentional tutorials that explains how to use the tools, how to get results, and then explains what happened and why. It covers some of the basics (like ifconfig, iwconfig, ping, and a little bit about packet specifications), and then moves on to the heavy-lifters like airmon, aireplay, airodump, wireshark, and others.While all of these tools have tutorials and manuals online, the way they work together is seldomly explained, and even more rarely are they explained with the clarity and focus of this book. The situations the book covers are realistic wireless network setups that you'll find at businesses, cafes, and homes. There are screenshots on nearly everypage, so it doesn't just explain what to do - it actually shows you.If you're completely new to pen-testing, this book is where you should start. You should try to learn at least a little bit of Linux before delving into this (but you should be learning that anyway) but this book doesn't assume that you are a pro. It guides you through all of the basic essentials, such as setting up a pen-testing lab environment (configuring your access point, making sure your wireless card is open enough to be configured, and so on), and even how to install Backtrack Linux itself. You will need a good lab environment to use this book effectively, so make sure you have access to a router, two laptops with wireless cards (one to use and one to be the victim), and a usb wireless card to perform packet injection (the book recommends the Alfa AWUS036H).All in all, whether you're learning this stuff because you're angry at the world and want to mess up wireless networks or because you're a sys admin and need to protect your network from intruders, this is easily the best book on the subject I have found. Too many books on this topic assume that the reader is a "security professional" and uses jargon and lingo without explaining anything. This book sits down with you, gives you the information you need, and you get the results that you wanted. Considering that courses from Backtrack's website start at around $750, this book feels like a hack in itself.
Amazon Verified review Amazon
Andrew Smith Feb 23, 2013
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book covers pretty much everything you would need to know in order to perform a professional wifi pentest. Wireless hacking is pretty easy to do relative to a number of other things you would do in the world of offensive security mainly due to the fact that you need not have any programming experience to pull it off.Much of it is simply a matter of memorizing the proper terminal commands and knowing when to use them, and this book covers this perfectly. Some of the things included in this book are:-How to install BackTrack 5 and set up a hack lab-General information on WLAN frames and the 802.11 protocol system-Some basic use of Wireshark to collect information on the network or area you are in (you'll know why https is important)-Cracking WEP, WPA, WPA2, and even getting past things like MAC filtering-Denial of service attacks (a complete jackass could really abuse this information if they are in a coffee shop)And so on. I won't go into too much detail except to say that this book can be used by anyone with no prior BackTrack experience so long as they are willing to set some time aside to try the things in this book. It truly gets right to the point about how to perform an attack first (so impatience is less of a problem) and then explaining why you ended up with the result that you got (if the attack was done correctly).For anyone interested in BackTrack, Wifi cracking, or hacking in general, this book is a must have!
Amazon Verified review Amazon
Nickg Sep 30, 2011
Full star icon Full star icon Full star icon Full star icon Full star icon 5
BackTrack 5 Wireless Penetration Testing Beginner's Guide is the perfect book for beginners and novices to dive into the wireless security field. Vivek Ramachandran (the Author) is an amazing teacher with a vast amount of knowledge on technology, networking, security and wireless. Vivek speaks at multiple security conferences every year and also discovered one of the wireless vulnerabilities and attacks used in the book called the "Caffe Latte Attack".The book starts you off with a quick introduction to wireless and security, then steps you through setting up a home lab with links to what software and hardware you will need. Cost is not an issue, with free virtualization software (VMware & Sun); anyone can setup a quick home lab. Chances are you already have a wireless router and laptop, so the only cost is this book and an external usb wireless card ($40 if that!) After the setup, BOOM; you are on your way to testing and hacking in your own home lab. The book guides you through hands on exercises to insure what you learn sticks with you. Also, every chapter has a review and questions to test what you have learned.Before I knew it, I was halfway through the book, not wanting to put it down. The tools you will learn are airmon-ng, aireplay-ng, airodump-ng, aircrack-ng and wireshark to name a few. You will use these tools to capture wireless packets, crack wep, wpa/wpa2 and also learn some linux command line.Wireless security is not a part of my job function, but learning about security and wireless is a hobby of mine. I am very glad to have found this book and after purchasing the ebook version, I may go back and purchase a hard copy to leave on my desk. :)If you have not visited securitytube.net (founded by Vivek), please do and purchase this book! BackTrack 5 Wireless Penetration Testing Beginner's Guide
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is the delivery time and cost of print book? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
What is custom duty/charge? Chevron down icon Chevron up icon

Customs duty are charges levied on goods when they cross international borders. It is a tax that is imposed on imported goods. These duties are charged by special authorities and bodies created by local governments and are meant to protect local industries, economies, and businesses.

Do I have to pay customs charges for the print book order? Chevron down icon Chevron up icon

The orders shipped to the countries that are listed under EU27 will not bear custom charges. They are paid by Packt as part of the order.

List of EU27 countries: www.gov.uk/eu-eea:

A custom duty or localized taxes may be applicable on the shipment and would be charged by the recipient country outside of the EU27 which should be paid by the customer and these duties are not included in the shipping charges been charged on the order.

How do I know my custom duty charges? Chevron down icon Chevron up icon

The amount of duty payable varies greatly depending on the imported goods, the country of origin and several other factors like the total invoice amount or dimensions like weight, and other such criteria applicable in your country.

For example:

  • If you live in Mexico, and the declared value of your ordered items is over $ 50, for you to receive a package, you will have to pay additional import tax of 19% which will be $ 9.50 to the courier service.
  • Whereas if you live in Turkey, and the declared value of your ordered items is over € 22, for you to receive a package, you will have to pay additional import tax of 18% which will be € 3.96 to the courier service.
How can I cancel my order? Chevron down icon Chevron up icon

Cancellation Policy for Published Printed Books:

You can cancel any order within 1 hour of placing the order. Simply contact customercare@packt.com with your order details or payment transaction id. If your order has already started the shipment process, we will do our best to stop it. However, if it is already on the way to you then when you receive it, you can contact us at customercare@packt.com using the returns and refund process.

Please understand that Packt Publishing cannot provide refunds or cancel any order except for the cases described in our Return Policy (i.e. Packt Publishing agrees to replace your printed book because it arrives damaged or material defect in book), Packt Publishing will not accept returns.

What is your returns and refunds policy? Chevron down icon Chevron up icon

Return Policy:

We want you to be happy with your purchase from Packtpub.com. We will not hassle you with returning print books to us. If the print book you receive from us is incorrect, damaged, doesn't work or is unacceptably late, please contact Customer Relations Team on customercare@packt.com with the order number and issue details as explained below:

  1. If you ordered (eBook, Video or Print Book) incorrectly or accidentally, please contact Customer Relations Team on customercare@packt.com within one hour of placing the order and we will replace/refund you the item cost.
  2. Sadly, if your eBook or Video file is faulty or a fault occurs during the eBook or Video being made available to you, i.e. during download then you should contact Customer Relations Team within 14 days of purchase on customercare@packt.com who will be able to resolve this issue for you.
  3. You will have a choice of replacement or refund of the problem items.(damaged, defective or incorrect)
  4. Once Customer Care Team confirms that you will be refunded, you should receive the refund within 10 to 12 working days.
  5. If you are only requesting a refund of one book from a multiple order, then we will refund you the appropriate single item.
  6. Where the items were shipped under a free shipping offer, there will be no shipping costs to refund.

On the off chance your printed book arrives damaged, with book material defect, contact our Customer Relation Team on customercare@packt.com within 14 days of receipt of the book with appropriate evidence of damage and we will work with you to secure a replacement copy, if necessary. Please note that each printed book you order from us is individually made by Packt's professional book-printing partner which is on a print-on-demand basis.

What tax is charged? Chevron down icon Chevron up icon

Currently, no tax is charged on the purchase of any print book (subject to change based on the laws and regulations). A localized VAT fee is charged only to our European and UK customers on eBooks, Video and subscriptions that they buy. GST is charged to Indian customers for eBooks and video purchases.

What payment methods can I use? Chevron down icon Chevron up icon

You can pay with the following card types:

  1. Visa Debit
  2. Visa Credit
  3. MasterCard
  4. PayPal
What is the delivery time and cost of print books? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela