万本电子书0元读

万本电子书0元读

顶部广告

Backtrack 4: Assuring Security by Penetration Testing电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Shakeel Ali

出  版  社:Packt Publishing

出版时间:2011-04-14

字       数:399.6万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.
目录展开

BackTrack 4: Assuring Security by Penetration Testing

Table of Contents

BackTrack 4: Assuring Security by Penetration Testing

Credits

About the Authors

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

I. Lab Preparation and Testing Procedures

1. Beginning with BackTrack

History

BackTrack purpose

Getting BackTrack

Using BackTrack

Live DVD

Installing to hard disk

Installation in real machine

Installation in VirtualBox

Portable BackTrack

Configuring network connection

Ethernet setup

Wireless setup

Starting the network service

Updating BackTrack

Updating software applications

Updating the kernel

Installing additional weapons

Nessus vulnerability scanner

WebSecurify

Customizing BackTrack

Summary

2. Penetration Testing Methodology

Types of penetration testing

Black-box testing

White-box testing

Vulnerability assessment versus penetration testing

Security testing methodologies

Open Source Security Testing Methodology Manual (OSSTMM)

Key features and benefits

Information Systems Security Assessment Framework (ISSAF)

Key features and benefits

Open Web Application Security Project (OWASP) Top Ten

Key features and benefits

Web Application Security Consortium Threat Classification (WASC-TC)

Key features and benefits

BackTrack testing methodology

Target scoping

Information gathering

Target discovery

Enumerating target

Vulnerability mapping

Social engineering

Target exploitation

Privilege escalation

Maintaining access

Documentation and reporting

The ethics

Summary

II. Penetration Testers Armory

3. Target Scoping

Gathering client requirements

Customer requirements form

Deliverables assessment form

Preparing the test plan

Test plan checklist

Profiling test boundaries

Defining business objectives

Project management and scheduling

Summary

4. Information Gathering

Public resources

Document gathering

Metagoofil

DNS information

dnswalk

dnsenum

dnsmap

dnsmap-bulk

dnsrecon

fierce

Route information

0trace

dmitry

itrace

tcpraceroute

tctrace

Utilizing search engines

goorecon

theharvester

All-in-one intelligence gathering

Maltego

Documenting the information

Dradis

Summary

5. Target Discovery

Introduction

Identifying the target machine

ping

arping

arping2

fping

genlist

hping2

hping3

lanmap

nbtscan

nping

onesixtyone

OS fingerprinting

p0f

xprobe2

Summary

6. Enumerating Target

Port scanning

AutoScan

Netifera

Nmap

Nmap target specification

Nmap TCP scan options

Nmap UDP scan options

Nmap port specification

Nmap output options

Nmap timing options

Nmap scripting engine

Unicornscan

Zenmap

Service enumeration

Amap

Httprint

Httsquash

VPN enumeration

ike-scan

Summary

7. Vulnerability Mapping

Types of vulnerabilities

Local vulnerability

Remote vulnerability

Vulnerability taxonomy

Open Vulnerability Assessment System (OpenVAS)

OpenVAS integrated security tools

Cisco analysis

Cisco Auditing Tool

Cisco Global Exploiter

Cisco Passwd Scanner

Fuzzy analysis

BED

Bunny

JBroFuzz

SMB analysis

Impacket Samrdump

Smb4k

SNMP analysis

ADMSnmp

Snmp Enum

SNMP Walk

Web application analysis

Database assessment tools

DBPwAudit

Pblind

SQLbrute

SQLiX

SQLMap

SQL Ninja

Application assessment tools

Burp Suite

Grendel Scan

LBD

Nikto2

Paros Proxy

Ratproxy

W3AF

WAFW00F

WebScarab

Summary

8. Social Engineering

Modeling human psychology

Attack process

Attack methods

Impersonation

Reciprocation

Influential authority

Scarcity

Social relationship

Social Engineering Toolkit (SET)

Targeted phishing attack

Gathering user credentials

Common User Passwords Profiler (CUPP)

Summary

9. Target Exploitation

Vulnerability research

Vulnerability and exploit repositories

Advanced exploitation toolkit

MSFConsole

MSFCLI

Ninja 101 drills

Scenario #1

Scenario #2

SNMP community scanner

VNC blank authentication scanner

IIS6 WebDAV unicode auth bypass

Scenario #3

Bind shell

Reverse shell

Meterpreter

Scenario #4

Scenario #5

Generating binary backdoor

Automated browser exploitation

Writing exploit module

Summary

10. Privilege Escalation

Attacking the password

Offline attack tools

Rainbowcrack

Samdump2

John

Ophcrack

Crunch

Wyd

Online attack tools

BruteSSH

Hydra

Network sniffers

Dsniff

Hamster

Tcpdump

Tcpick

Wireshark

Network spoofing tools

Arpspoof

Ettercap

Summary

11. Maintaining Access

Protocol tunneling

DNS2tcp

Ptunnel

Stunnel4

Proxy

3proxy

Proxychains

End-to-end connection

CryptCat

Sbd

Socat

Summary

12. Documentation and Reporting

Documentation and results verification

Types of reports

Executive report

Management report

Technical report

Network penetration testing report (sample contents)

Table of Contents

Presentation

Post testing procedures

Summary

A. Supplementary Tools

Vulnerability scanner

NeXpose community edition

NeXpose installation

Starting NeXpose community

Login to NeXpose community

Using NeXpose community

Web application fingerprinter

WhatWeb

BlindElephant

Network Ballista

Netcat

Open connection

Service banner grabbing

Simple server

File transfer

Portscanning

Backdoor Shell

Reverse shell

Summary

B. Key Resources

Vulnerability Disclosure and Tracking

Paid Incentive Programs

Reverse Engineering Resources

Network ports

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部