C
Carwhisperer, Bluetooth vulnerability exploitation
366
Case studies
BackTrack toolkit creation case study
23–27 , 24f
custom malware
181–187
database hacking
212–214 , 213f , 214f , 215f , 216f
enterprise applications
313–317
client system list
314t
compromised application server
317f
Metasploit configuration
316f
Nmap scan
315f
sapyto connector discovery
316f
footprinting
89–90 , 89f , 90f
intelligence gathering
85–89 , 85f , 88f
network devices
284–299 , 287f
pen-test lab
397–400 , 398f , 399f
phishing
181–187
reconnaissance
85
scanning and enumeration
external penetration test
129–131 , 130f , 131f
internal penetration test
131
noisy (IDS) testing
136 , 137f
overview
128
stealthy penetration test
134 , 134f , 135f
social network attacks
181–187
verification
85 , 90–91 , 91f , 92f
web server ...

Get Penetration Tester's Open Source Toolkit, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.