Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant |
Autore | Uygur Stefan Umit |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing Ltd, , 2014 |
Descrizione fisica | 1 online resource (130 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SawantAniket |
Collana | Community experience distilled |
Soggetto topico | Penetration testing (Computer security) |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78328-298-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Starting Out with BackBox Linux; A flexible penetration testing distribution; The organization of tools in BackBox; Information Gathering; Vulnerability Assessment; Exploitation; Privilege Escalation; Maintaining Access; Documentation & Reporting; Reverse Engineering; Social Engineering; Stress Testing; Forensic Analysis; VoIP Analysis; Wireless Analysis; Miscellaneous; Services; Update; Anonymous; Extras; Completeness, accuracy, and support; Links and contacts; Summary
Chapter 2: Information GatheringStarting with an unknown system; Automater; Whatweb; Recon-ng; Proceeding with a known system; Nmap; Summary; Chapter 3: Vulnerability Assessment and Management; Vulnerability scanning; Setting up the environment; Running the scan with OpenVAS; False positives; An example of vulnerability verification; Summary; Chapter 4: Exploitations; Exploitation of a SQL injection on a database; Sqlmap usage and vulnerability exploitation; Finding the encrypted password; Exploiting web applications with W3af; Summary; Chapter 5: Eavesdropping and Privilege Escalation Sniffing encrypted SSL/TLS trafficAn SSL MITM attack using sslstrip; Password cracking; Offline password cracking using John the Ripper; Remote password cracking with Hydra and xHydra; Summary; Chapter 6: Maintaining Access; Backdoor Weevely; Weevely in URL; Performing system commands; Enumerate config files; Getting access credentials; File editing; Gathering full system information; Summary; Chapter 7: Penetration Testing Methodologies with BackBox; Information gathering; Scanning; Exploitation; Summary; Chapter 8: Documentation and Reporting; MagicTree - the auditing productivity tool SummaryIndex |
Record Nr. | UNINA-9910464208603321 |
Uygur Stefan Umit | ||
Birmingham, England : , : Packt Publishing Ltd, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant |
Autore | Uygur Stefan Umit |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing Ltd, , 2014 |
Descrizione fisica | 1 online resource (130 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SawantAniket |
Collana | Community experience distilled |
Soggetto topico | Penetration testing (Computer security) |
ISBN | 1-78328-298-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Starting Out with BackBox Linux; A flexible penetration testing distribution; The organization of tools in BackBox; Information Gathering; Vulnerability Assessment; Exploitation; Privilege Escalation; Maintaining Access; Documentation & Reporting; Reverse Engineering; Social Engineering; Stress Testing; Forensic Analysis; VoIP Analysis; Wireless Analysis; Miscellaneous; Services; Update; Anonymous; Extras; Completeness, accuracy, and support; Links and contacts; Summary
Chapter 2: Information GatheringStarting with an unknown system; Automater; Whatweb; Recon-ng; Proceeding with a known system; Nmap; Summary; Chapter 3: Vulnerability Assessment and Management; Vulnerability scanning; Setting up the environment; Running the scan with OpenVAS; False positives; An example of vulnerability verification; Summary; Chapter 4: Exploitations; Exploitation of a SQL injection on a database; Sqlmap usage and vulnerability exploitation; Finding the encrypted password; Exploiting web applications with W3af; Summary; Chapter 5: Eavesdropping and Privilege Escalation Sniffing encrypted SSL/TLS trafficAn SSL MITM attack using sslstrip; Password cracking; Offline password cracking using John the Ripper; Remote password cracking with Hydra and xHydra; Summary; Chapter 6: Maintaining Access; Backdoor Weevely; Weevely in URL; Performing system commands; Enumerate config files; Getting access credentials; File editing; Gathering full system information; Summary; Chapter 7: Penetration Testing Methodologies with BackBox; Information gathering; Scanning; Exploitation; Summary; Chapter 8: Documentation and Reporting; MagicTree - the auditing productivity tool SummaryIndex |
Record Nr. | UNINA-9910789005503321 |
Uygur Stefan Umit | ||
Birmingham, England : , : Packt Publishing Ltd, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / / Stefan Umit Uygur ; cover image by Aniket Sawant |
Autore | Uygur Stefan Umit |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing Ltd, , 2014 |
Descrizione fisica | 1 online resource (130 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | SawantAniket |
Collana | Community experience distilled |
Soggetto topico | Penetration testing (Computer security) |
ISBN | 1-78328-298-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Starting Out with BackBox Linux; A flexible penetration testing distribution; The organization of tools in BackBox; Information Gathering; Vulnerability Assessment; Exploitation; Privilege Escalation; Maintaining Access; Documentation & Reporting; Reverse Engineering; Social Engineering; Stress Testing; Forensic Analysis; VoIP Analysis; Wireless Analysis; Miscellaneous; Services; Update; Anonymous; Extras; Completeness, accuracy, and support; Links and contacts; Summary
Chapter 2: Information GatheringStarting with an unknown system; Automater; Whatweb; Recon-ng; Proceeding with a known system; Nmap; Summary; Chapter 3: Vulnerability Assessment and Management; Vulnerability scanning; Setting up the environment; Running the scan with OpenVAS; False positives; An example of vulnerability verification; Summary; Chapter 4: Exploitations; Exploitation of a SQL injection on a database; Sqlmap usage and vulnerability exploitation; Finding the encrypted password; Exploiting web applications with W3af; Summary; Chapter 5: Eavesdropping and Privilege Escalation Sniffing encrypted SSL/TLS trafficAn SSL MITM attack using sslstrip; Password cracking; Offline password cracking using John the Ripper; Remote password cracking with Hydra and xHydra; Summary; Chapter 6: Maintaining Access; Backdoor Weevely; Weevely in URL; Performing system commands; Enumerate config files; Getting access credentials; File editing; Gathering full system information; Summary; Chapter 7: Penetration Testing Methodologies with BackBox; Information gathering; Scanning; Exploitation; Summary; Chapter 8: Documentation and Reporting; MagicTree - the auditing productivity tool SummaryIndex |
Record Nr. | UNINA-9910815564903321 |
Uygur Stefan Umit | ||
Birmingham, England : , : Packt Publishing Ltd, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|