top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant
Autore Uygur Stefan Umit
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing Ltd, , 2014
Descrizione fisica 1 online resource (130 p.)
Disciplina 005.8
Altri autori (Persone) SawantAniket
Collana Community experience distilled
Soggetto topico Penetration testing (Computer security)
Soggetto genere / forma Electronic books.
ISBN 1-78328-298-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Starting Out with BackBox Linux; A flexible penetration testing distribution; The organization of tools in BackBox; Information Gathering; Vulnerability Assessment; Exploitation; Privilege Escalation; Maintaining Access; Documentation & Reporting; Reverse Engineering; Social Engineering; Stress Testing; Forensic Analysis; VoIP Analysis; Wireless Analysis; Miscellaneous; Services; Update; Anonymous; Extras; Completeness, accuracy, and support; Links and contacts; Summary
Chapter 2: Information GatheringStarting with an unknown system; Automater; Whatweb; Recon-ng; Proceeding with a known system; Nmap; Summary; Chapter 3: Vulnerability Assessment and Management; Vulnerability scanning; Setting up the environment; Running the scan with OpenVAS; False positives; An example of vulnerability verification; Summary; Chapter 4: Exploitations; Exploitation of a SQL injection on a database; Sqlmap usage and vulnerability exploitation; Finding the encrypted password; Exploiting web applications with W3af; Summary; Chapter 5: Eavesdropping and Privilege Escalation
Sniffing encrypted SSL/TLS trafficAn SSL MITM attack using sslstrip; Password cracking; Offline password cracking using John the Ripper; Remote password cracking with Hydra and xHydra; Summary; Chapter 6: Maintaining Access; Backdoor Weevely; Weevely in URL; Performing system commands; Enumerate config files; Getting access credentials; File editing; Gathering full system information; Summary; Chapter 7: Penetration Testing Methodologies with BackBox; Information gathering; Scanning; Exploitation; Summary; Chapter 8: Documentation and Reporting; MagicTree - the auditing productivity tool
SummaryIndex
Record Nr. UNINA-9910464208603321
Uygur Stefan Umit  
Birmingham, England : , : Packt Publishing Ltd, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant
Autore Uygur Stefan Umit
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing Ltd, , 2014
Descrizione fisica 1 online resource (130 p.)
Disciplina 005.8
Altri autori (Persone) SawantAniket
Collana Community experience distilled
Soggetto topico Penetration testing (Computer security)
ISBN 1-78328-298-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Starting Out with BackBox Linux; A flexible penetration testing distribution; The organization of tools in BackBox; Information Gathering; Vulnerability Assessment; Exploitation; Privilege Escalation; Maintaining Access; Documentation & Reporting; Reverse Engineering; Social Engineering; Stress Testing; Forensic Analysis; VoIP Analysis; Wireless Analysis; Miscellaneous; Services; Update; Anonymous; Extras; Completeness, accuracy, and support; Links and contacts; Summary
Chapter 2: Information GatheringStarting with an unknown system; Automater; Whatweb; Recon-ng; Proceeding with a known system; Nmap; Summary; Chapter 3: Vulnerability Assessment and Management; Vulnerability scanning; Setting up the environment; Running the scan with OpenVAS; False positives; An example of vulnerability verification; Summary; Chapter 4: Exploitations; Exploitation of a SQL injection on a database; Sqlmap usage and vulnerability exploitation; Finding the encrypted password; Exploiting web applications with W3af; Summary; Chapter 5: Eavesdropping and Privilege Escalation
Sniffing encrypted SSL/TLS trafficAn SSL MITM attack using sslstrip; Password cracking; Offline password cracking using John the Ripper; Remote password cracking with Hydra and xHydra; Summary; Chapter 6: Maintaining Access; Backdoor Weevely; Weevely in URL; Performing system commands; Enumerate config files; Getting access credentials; File editing; Gathering full system information; Summary; Chapter 7: Penetration Testing Methodologies with BackBox; Information gathering; Scanning; Exploitation; Summary; Chapter 8: Documentation and Reporting; MagicTree - the auditing productivity tool
SummaryIndex
Record Nr. UNINA-9910789005503321
Uygur Stefan Umit  
Birmingham, England : , : Packt Publishing Ltd, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant
Autore Uygur Stefan Umit
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing Ltd, , 2014
Descrizione fisica 1 online resource (130 p.)
Disciplina 005.8
Altri autori (Persone) SawantAniket
Collana Community experience distilled
Soggetto topico Penetration testing (Computer security)
ISBN 1-78328-298-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Starting Out with BackBox Linux; A flexible penetration testing distribution; The organization of tools in BackBox; Information Gathering; Vulnerability Assessment; Exploitation; Privilege Escalation; Maintaining Access; Documentation & Reporting; Reverse Engineering; Social Engineering; Stress Testing; Forensic Analysis; VoIP Analysis; Wireless Analysis; Miscellaneous; Services; Update; Anonymous; Extras; Completeness, accuracy, and support; Links and contacts; Summary
Chapter 2: Information GatheringStarting with an unknown system; Automater; Whatweb; Recon-ng; Proceeding with a known system; Nmap; Summary; Chapter 3: Vulnerability Assessment and Management; Vulnerability scanning; Setting up the environment; Running the scan with OpenVAS; False positives; An example of vulnerability verification; Summary; Chapter 4: Exploitations; Exploitation of a SQL injection on a database; Sqlmap usage and vulnerability exploitation; Finding the encrypted password; Exploiting web applications with W3af; Summary; Chapter 5: Eavesdropping and Privilege Escalation
Sniffing encrypted SSL/TLS trafficAn SSL MITM attack using sslstrip; Password cracking; Offline password cracking using John the Ripper; Remote password cracking with Hydra and xHydra; Summary; Chapter 6: Maintaining Access; Backdoor Weevely; Weevely in URL; Performing system commands; Enumerate config files; Getting access credentials; File editing; Gathering full system information; Summary; Chapter 7: Penetration Testing Methodologies with BackBox; Information gathering; Scanning; Exploitation; Summary; Chapter 8: Documentation and Reporting; MagicTree - the auditing productivity tool
SummaryIndex
Record Nr. UNINA-9910815564903321
Uygur Stefan Umit  
Birmingham, England : , : Packt Publishing Ltd, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui