Book description
Overview of BackTrack 4: Assuring Security by Penetration Testing
- Learn the black-art of penetration testing with in-depth coverage of BackTrack Linux distribution
- Explore the insights and importance of testing your corporate network systems before hackers strike it
- Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits
- Fully illustrated with practical examples, step-by-step instructions, and useful tips to cover the best-of-breed security assessment tools
In Detail
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network.
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today's digital age.
The authors' experience and expertise enables them to reveal the industry's best approach for logical and systematic penetration testing.
The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, maintaining access, and reporting), following the formal testing methodology. Each of these tools is illustrated with real-world examples to highlight their practical usage and proven configuration techniques. The authors also provide extra weaponry treasures and cite key resources that may be crucial to any professional penetration tester.
This book serves as a single professional, practical, and expert guide to developing hardcore penetration testing skills from scratch. You will be trained to make the best use of BackTrack OS either in a commercial environment or an experimental test bed.
A tactical example-driven guide for mastering the penetration testing skills with BackTrack to identify, detect, and exploit vulnerabilities at your digital doorstep.
Table of contents
-
BackTrack 4: Assuring Security by Penetration Testing
- BackTrack 4: Assuring Security by Penetration Testing
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
-
I. Lab Preparation and Testing Procedures
- 1. Beginning with BackTrack
-
2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- BackTrack testing methodology
- The ethics
- Summary
-
II. Penetration Testers Armory
- 3. Target Scoping
- 4. Information Gathering
- 5. Target Discovery
- 6. Enumerating Target
- 7. Vulnerability Mapping
- 8. Social Engineering
- 9. Target Exploitation
- 10. Privilege Escalation
- 11. Maintaining Access
- 12. Documentation and Reporting
- A. Supplementary Tools
- B. Key Resources
Product information
- Title: BackTrack 4: Assuring Security by Penetration Testing
- Author(s):
- Release date: April 2011
- Publisher(s): Packt Publishing
- ISBN: 9781849513944
You might also like
book
Kali Linux – Assuring Security by Penetration Testing
With Kali Linux you can test the vulnerabilities of your network and then take steps to …
book
Network Security First-Step, Second Edition
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world …
book
Linux Server Security, Second Edition
Linux consistently appears high up in the list of popular Internet servers, whether it's for the …
book
Hands-On Penetration Testing on Windows
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for …