Book description
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.• Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
• Demystify Enumeration and Scanning
Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.
• Hack Database Services
Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.
• Test Web Servers and Applications
Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.
• Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
• Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.
• Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
• Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
• Build Your Own PenTesting Lab
Everything you need to build your own fully functional attack lab.
Table of contents
- Copyright
- Technical Editor and Contributing Author
- Contributing Authors
-
1. Reconnaissance
- Objectives
- Approach
- Core Technologies
-
Open Source Tools
-
Intelligence Gathering Tools
- Web Resources
-
Linux/UNIX Command-Line Tools
- BiLE Software Suite
- BiLE Suite: BiLE.pl (www.sensepost.com/research/)
- BiLE Suite: BiLE-weigh.pl
- BiLE Suite: vet-IPrange.pl
- BiLE Suite: vet-mx.pl
- BiLE Suite: exp-tld.pl
- nslookup
- WHOIS
- Gnetutil 1.0 (www.culte.org/projets/developpement/gnetutil/)
- HTTrack (www.httrack.com)
- Greenwich (jodrell.net/projects/Greenwich)
- Open Source Windows Tools
- Footprinting Tools
- Verification Tools
-
Intelligence Gathering Tools
- Case Study: The Tools in Action
- 2. Enumeration and Scanning
-
3. Hacking Database Services
- Introduction
- Objectives
- Approach
- Core Technologies
-
Case Studies: Using Open Source and Closed Source Tools
-
Microsoft SQL Server
- Discovering Microsoft SQL Servers
- Identifying Vulnerable Microsoft SQL Server Services
- Attacking Microsoft SQL Server Authentication
- Microsoft SQL Server Password Creation Guidelines
- Microsoft SQL Default Usernames and Passwords
- Creating Username and Dictionary Files
- SQL Auditing Tools (SQLAT)
- Obtaining and Cracking Microsoft SQL Server Password Hashes
- Analyzing the Database
- Obtaining Access to the Host Operating System
- SQLAT: SQLExec (Sqlquery), TFTP, and fgdump.exe
- Oracle Database Management System
- SQL Clients
-
Microsoft SQL Server
- Further Information
- 4. Web Server and Web Application Testing
-
5. Wireless Penetration Testing Using BackTrack 2
- Introduction
- Approach
- Core Technologies
- Open Source Tools
- Case Studies
- Summary
- 6. Network Devices
- 7. Customizing BackTrack 2
- 8. Forensic Discovery and Analysis Using Backtrack
-
9. Building Penetration Test Labs
- Introduction
- Setting Up a Penetration Test Lab
- Running Your Lab
- Targets in the Penetration Test Lab
- Summary
Product information
- Title: Penetration Tester's Open Source Toolkit, 2nd Edition
- Author(s):
- Release date: November 2007
- Publisher(s): Syngress
- ISBN: 9780080556079
You might also like
book
How Cybersecurity Really Works
You don’t need a technical background to understand core cybersecurity concepts and their practical applications – …
book
Practical Social Engineering
Social engineering is the art of capitalizing on human psychology rather than technical vulnerabilities to compromise …
book
Penetration Testing
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …
book
Practical Vulnerability Management
Bugs: they’re everywhere. Software, firmware, hardware — they all have them. Bugs even live in the …