LEADER 04856nam 2200673 a 450 001 9910790080203321 005 20200520144314.0 010 $a1-283-37675-X 010 $a9786613376756 010 $a1-84951-395-3 035 $a(CKB)2670000000089229 035 $a(EBL)950518 035 $a(OCoLC)797916375 035 $a(SSID)ssj0000521050 035 $a(PQKBManifestationID)11361210 035 $a(PQKBTitleCode)TC0000521050 035 $a(PQKBWorkID)10517708 035 $a(PQKB)10028033 035 $a(Au-PeEL)EBL950518 035 $a(CaPaEBR)ebr10467620 035 $a(CaONFJC)MIL337675 035 $a(CaSebORM)9781849513944 035 $a(MiAaPQ)EBC950518 035 $a(PPN)228036399 035 $a(EXLCZ)992670000000089229 100 $a20110518d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBackTrack 4$b[electronic resource] $eassuring security by penetration testing : master the art of penetration testing with BackTrack /$fShakeel Ali, Tedi Heriyanto 205 $a1st edition 210 $aBirmingham, U.K. $cPackt Open Source$d2011 215 $a1 online resource (599 p.) 225 1 $aCommunity experience distilled 300 $aIncludes index. 311 $a1-84951-394-5 327 $aBackTrack 4: Assuring Security by Penetration Testing; BackTrack 4: Assuring Security by Penetration Testing; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; I. Lab Preparation and Testing Procedures; 1. Beginning with BackTrack; History; BackTrack purpose; Getting BackTrack; Using BackTrack; Live DVD 327 $aInstalling to hard diskInstallation in real machine; Installation in VirtualBox; Portable BackTrack; Configuring network connection; Ethernet setup; Wireless setup; Starting the network service; Updating BackTrack; Updating software applications; Updating the kernel; Installing additional weapons; Nessus vulnerability scanner; WebSecurify; Customizing BackTrack; Summary; 2. Penetration Testing Methodology; Types of penetration testing; Black-box testing; White-box testing; Vulnerability assessment versus penetration testing; Security testing methodologies 327 $aOpen Source Security Testing Methodology Manual (OSSTMM)Key features and benefits; Information Systems Security Assessment Framework (ISSAF); Key features and benefits; Open Web Application Security Project (OWASP) Top Ten; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; BackTrack testing methodology; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting 327 $aThe ethicsSummary; II. Penetration Testers Armory; 3. Target Scoping; Gathering client requirements; Customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; 4. Information Gathering; Public resources; Document gathering; Metagoofil; DNS information; dnswalk; dnsenum; dnsmap; dnsmap-bulk; dnsrecon; fierce; Route information; 0trace; dmitry; itrace; tcpraceroute; tctrace; Utilizing search engines; goorecon; theharvester 327 $aAll-in-one intelligence gatheringMaltego; Documenting the information; Dradis; Summary; 5. Target Discovery; Introduction; Identifying the target machine; ping; arping; arping2; fping; genlist; hping2; hping3; lanmap; nbtscan; nping; onesixtyone; OS fingerprinting; p0f; xprobe2; Summary; 6. Enumerating Target; Port scanning; AutoScan; Netifera; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap scripting engine; Unicornscan; Zenmap; Service enumeration; Amap; Httprint; Httsquash 327 $aVPN enumeration 330 $aMaster the art of penetration testing with BackTrack 606 $aComputer networks$xSecurity measures 606 $aComputer security$xEvaluation 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security$xEvaluation. 676 $a005.8 700 $aAli$b Shakeel$01511026 701 $aHeriyanto$b Tedi$01511027 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790080203321 996 $aBackTrack 4$93744062 997 $aUNINA