
- 592 pages
- English
- PDF
- Available on iOS & Android
Penetration Tester's Open Source Toolkit
About this book
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.â˘Perform Network ReconnaissanceMaster the objectives, methodology, and tools of the least understood aspect of a penetration test.â˘Demystify Enumeration and ScanningIdentify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.â˘Hack Database ServicesUnderstand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.â˘Test Web Servers and ApplicationsCompromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.â˘Test Wireless Networks and DevicesUnderstand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.â˘Examine Vulnerabilities on Network Routers and SwitchesUse Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.â˘Customize BackTrack 2Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.â˘Perform Forensic Discovery and Analysis with BackTrack 2Use BackTrack in the field for forensic analysis, image acquisition, and file carving.â˘Build Your Own PenTesting LabEverything you need to build your own fully functional attack lab.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front Cover
- Penetration Tester's Open Source Toolkit
- Copyright Page
- Technical Editor and Contributing Author
- Contributing Authors
- Contents
- Chapter 1: Reconnaissance
- Chapter 2: Enumeration and Scanning
- Chapter 3: Hacking Database Services
- Chapter 4: Web Server and Web Application Testing
- Chapter 5: Wireless Penetration Testing Using BackTrack 2
- Chapter 6: Network Devices
- Chapter 7: Customizing BackTrack 2
- Chapter 8: Forensic Discovery and Analysis Using Backtrack
- Chapter 9: Building Penetration Test Labs
- Index