万本电子书0元读

万本电子书0元读

顶部广告

Penetration Testing with BackBox电子书

售       价:¥

1人正在读 | 0人评论 9.8

作       者:Stefan Umit Uygur

出  版  社:Packt Publishing

出版时间:2014-02-20

字       数:57.2万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a realworld setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and userfriendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing.
目录展开

Penetration Testing with BackBox

Table of Contents

Penetration Testing with BackBox

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Starting Out with BackBox Linux

A flexible penetration testing distribution

The organization of tools in BackBox

Information Gathering

Vulnerability Assessment

Exploitation

Privilege Escalation

Maintaining Access

Documentation & Reporting

Reverse Engineering

Social Engineering

Stress Testing

Forensic Analysis

VoIP Analysis

Wireless Analysis

Miscellaneous

Services

Update

Anonymous

Extras

Completeness, accuracy, and support

Links and contacts

Summary

2. Information Gathering

Starting with an unknown system

Automater

Whatweb

Recon-ng

Proceeding with a known system

Nmap

Summary

3. Vulnerability Assessment and Management

Vulnerability scanning

Setting up the environment

Running the scan with OpenVAS

False positives

An example of vulnerability verification

Summary

4. Exploitations

Exploitation of a SQL injection on a database

Sqlmap usage and vulnerability exploitation

Finding the encrypted password

Exploiting web applications with W3af

Summary

5. Eavesdropping and Privilege Escalation

Sniffing encrypted SSL/TLS traffic

An SSL MITM attack using sslstrip

Password cracking

Offline password cracking using John the Ripper

Remote password cracking with Hydra and xHydra

Summary

6. Maintaining Access

Backdoor Weevely

Weevely in URL

Performing system commands

Enumerating config files

Getting access credentials

Editing files

Gathering full system information

Summary

7. Penetration Testing Methodologies with BackBox

Information gathering

Scanning

Exploitation

Summary

8. Documentation and Reporting

MagicTree – the auditing productivity tool

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部