Chapter 13. Penetrating UNIX, Microsoft, and Novell Servers

The world will not evolve past its current state of crisis by using the same thinking that created the situation.

—Albert Einstein

In Chapter 12, “Using Trojans and Backdoor Applications,” you learned about Trojans and other backdoor applications that you can use on your target hosts during a penetration test. This chapter covers other means of testing servers for vulnerabilities. This chapter also covers exploits for the three most popular server operating system platforms—UNIX, Microsoft, and Novell.

No matter what server platform you use, however, you will probably begin your test with a vulnerability scanner. A vulnerability scanner scans your target host and checks it against a ...

Get Penetration Testing and Network Defense now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.