LEADER 05457nam 2200721 a 450 001 9910451850903321 005 20211115232416.0 010 $a1-62198-905-4 010 $a1-280-67747-3 010 $a9786613654403 010 $a1-84951-775-4 035 $a(CKB)2550000000101867 035 $a(EBL)946941 035 $a(OCoLC)794903866 035 $a(SSID)ssj0000676594 035 $a(PQKBManifestationID)12229141 035 $a(PQKBTitleCode)TC0000676594 035 $a(PQKBWorkID)10684110 035 $a(PQKB)11713335 035 $a(MiAaPQ)EBC946941 035 $a(PPN)227993802 035 $a(Au-PeEL)EBL946941 035 $a(CaPaEBR)ebr10563887 035 $a(CaONFJC)MIL365440 035 $a(EXLCZ)992550000000101867 100 $a20120605d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAdvanced penetration testing for highly-secured environments$b[electronic resource] $ethe ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide /$fLee Allen 210 $aBirmingham, U.K. $cPackt Pub.$d2012 215 $a1 online resource (414 p.) 225 1 $aOpen source : community experience distilled 300 $aDescription based upon print version of record. 311 $a1-84951-774-6 327 $aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Planning and Scoping for a Successful Penetration Test; Introduction to advanced penetration testing; Vulnerability assessments; Penetration testing; Advanced penetration testing; Before testing begins; Determining scope; Setting limits - nothing lasts forever; Rules of engagement documentation; Planning for action; Installing VirtualBox; Installing your BackTrack virtual machine; Preparing the virtual guest machine for BackTrack 327 $aInstalling BackTrack on the virtual disk imageExploring BackTrack; Logging in; Changing the default password; Updating the applications and operating system; Installing OpenOffice; Effectively manage your test results; Introduction to MagicTree; Starting MagicTree; Adding nodes; Data collection; Report generation; Introduction to the Dradis Framework; Exporting a project template; Importing a project template; Preparing sample data for import; Importing your Nmap data; Exporting data into HTML; Dradis Category field; Changing the default HTML template; Summary 327 $aChapter 2: Advanced Reconnaissance TechniquesIntroduction to reconnaissance; Reconnaissance workflow; DNS recon; Nslookup - it's there when you need it; Default output; Changing nameservers; Creating an automation script; What did we learn?; Domain Information Groper (Dig); Default output; Zone transfers using Dig; Advanced features of Dig; DNS brute forcing with fierce; Default command usage; Creating a custom wordlist; Gathering and validating domain and IP information; Gathering information with whois; Specifying which registrar to use; Where in the world is this IP?; Defensive measures 327 $aUsing search engines to do your job for youSHODAN; Filters; Understanding banners; Finding specific assets; Finding people (and their documents) on the web; Google hacking database; Metagoofil; Searching the Internet for clues; Metadata collection; Extracting metadata from photos using exiftool; Summary; Chapter 3: Enumeration: Choosing Your Targets Wisely; Adding another virtual machine to our lab; Configuring and testing our Vlab_1 clients; BackTrack - Manual ifconfig; Ubuntu - Manual ifconfig; Verifying connectivity; Maintaining IP settings after reboot; Nmap - getting to know you 327 $aCommonly seen Nmap scan types and optionsBasic scans - warming up; Other Nmap techniques; Remaining stealthy; Shifting blame - the zombies did it!; IDS rules, how to avoid them; Using decoys; Adding custom Nmap scripts to your arsenal; How to decide if a script is right for you; Adding a new script to the database; SNMP: A goldmine of information just waiting to be discovered; SNMPEnum; SNMPCheck; When the SNMP community string is NOT ""public""; Creating network baselines with scanPBNJ; Setting up MySQL for PBNJ; Starting MySQL; Preparing the PBNJ database; First scan; Reviewing the data 327 $aEnumeration avoidance techniques 330 $aLearn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. 410 0$aCommunity experience distilled. 606 $aComputer security$xTesting$vHandbooks, manuals, etc 606 $aPenetration testing (Computer security)$vHandbooks, manuals, etc 606 $aComputer networks$xSecurity measures$vHandbooks, manuals, etc 606 $aComputer networks$vHandbooks, manuals, etc 608 $aElectronic books. 615 0$aComputer security$xTesting 615 0$aPenetration testing (Computer security) 615 0$aComputer networks$xSecurity measures 615 0$aComputer networks 676 $a005.8 700 $aAllen$b Lee$c(Information security specialist)$0944552 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451850903321 996 $aAdvanced penetration testing for highly-secured environments$92192264 997 $aUNINA