Book description
Overview of BackTrack 4: Assuring Security by Penetration Testing
- Learn the black-art of penetration testing with in-depth coverage of BackTrack Linux distribution
- Explore the insights and importance of testing your corporate network systems before hackers strike it
- Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits
- Fully illustrated with practical examples, step-by-step instructions, and useful tips to cover the best-of-breed security assessment tools
In Detail
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network.
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today's digital age.
The authors' experience and expertise enables them to reveal the industry's best approach for logical and systematic penetration testing.
The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, maintaining access, and reporting), following the formal testing methodology. Each of these tools is illustrated with real-world examples to highlight their practical usage and proven configuration techniques. The authors also provide extra weaponry treasures and cite key resources that may be crucial to any professional penetration tester.
This book serves as a single professional, practical, and expert guide to developing hardcore penetration testing skills from scratch. You will be trained to make the best use of BackTrack OS either in a commercial environment or an experimental test bed.
A tactical example-driven guide for mastering the penetration testing skills with BackTrack to identify, detect, and exploit vulnerabilities at your digital doorstep.
Table of contents
-
BackTrack 4: Assuring Security by Penetration Testing
- BackTrack 4: Assuring Security by Penetration Testing
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
-
I. Lab Preparation and Testing Procedures
- 1. Beginning with BackTrack
-
2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- BackTrack testing methodology
- The ethics
- Summary
-
II. Penetration Testers Armory
- 3. Target Scoping
- 4. Information Gathering
- 5. Target Discovery
- 6. Enumerating Target
- 7. Vulnerability Mapping
- 8. Social Engineering
- 9. Target Exploitation
- 10. Privilege Escalation
- 11. Maintaining Access
- 12. Documentation and Reporting
- A. Supplementary Tools
- B. Key Resources
Product information
- Title: BackTrack 4: Assuring Security by Penetration Testing
- Author(s):
- Release date: April 2011
- Publisher(s): Packt Publishing
- ISBN: 9781849513944
You might also like
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
book
Practical Vulnerability Management
Bugs: they’re everywhere. Software, firmware, hardware — they all have them. Bugs even live in the …
book
Infrastructure as Code, 2nd Edition
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other …
book
Securing DevOps
Securing DevOps explores how the techniques of DevOps and security should be applied together to make …