skip to content
BackTrack 4 : assuring security by penetration testing Preview this item
ClosePreview this item
Checking...

BackTrack 4 : assuring security by penetration testing

Author: Shakeel Ali; Tedi Heriyanto
Publisher: Birmingham, UK : Packt, ©2011.
Series: Community experience distilled.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Annotation
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Ali, Shakeel.
BackTrack 4.
Birmingham, UK : Packt, ©2011
(OCoLC)728008053
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Shakeel Ali; Tedi Heriyanto
ISBN: 9781849513951 1849513953
OCLC Number: 780165941
Description: 1 online resource (vii, 371 pages) : illustrations.
Contents: All-in-one intelligence gatheringMaltego --
Documenting the information --
Dradis --
Summary --
5. Target Discovery --
Introduction --
Identifying the target machine --
ping --
arping --
arping --
2. --
fping --
genlist --
hping --
2. --
hping --
3. --
lanmap --
nbtscan --
nping --
onesixtyone --
OS fingerprinting --
p --
0. f --
xprobe --
2. --
Summary --
6. Enumerating Target --
Port scanning --
AutoScan --
Netifera --
Nmap --
Nmap target specification --
Nmap TCP scan options --
Nmap UDP scan options --
Nmap port specification --
Nmap output options --
Nmap timing options --
Nmap scripting engine --
Unicornscan --
Zenmap --
Service enumeration --
Amap --
Httprint --
Httsquash BackTrack 4: Assuring Security by Penetration Testing --
BackTrack 4: Assuring Security by Penetration Testing --
Credits --
About the Authors --
About the Reviewers --
www.PacktPub.com --
Support files, eBooks, discount offers and more --
Why Subscribe --
Free Access for Packt account holders --
What this book covers --
What you need for this book --
Who this book is for --
Conventions --
Reader feedback --
Customer support --
Errata --
Piracy --
Questions --
I. Lab Preparation and Testing Procedures --
1. Beginning with BackTrack --
History --
BackTrack purpose --
Getting BackTrack --
Using BackTrack --
Live DVD Installing to hard diskInstallation in real machine --
Installation in VirtualBox --
Portable BackTrack --
Configuring network connection --
Ethernet setup --
Wireless setup --
Starting the network service --
Updating BackTrack --
Updating software applications --
Updating the kernel --
Installing additional weapons --
Nessus vulnerability scanner --
WebSecurify --
Customizing BackTrack --
Summary --
2. Penetration Testing Methodology --
Types of penetration testing --
Black-box testing --
White-box testing --
Vulnerability assessment versus penetration testing --
Security testing methodologies Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits --
Information Systems Security Assessment Framework (ISSAF) --
Key features and benefits --
Open Web Application Security Project (OWASP) Top Ten --
Key features and benefits --
Web Application Security Consortium Threat Classification (WASC-TC) --
Key features and benefits --
BackTrack testing methodology --
Target scoping --
Information gathering --
Target discovery --
Enumerating target --
Vulnerability mapping --
Social engineering --
Target exploitation --
Privilege escalation --
Maintaining access --
Documentation and reporting The ethicsSummary --
II. Penetration Testers Armory --
3. Target Scoping --
Gathering client requirements --
Customer requirements form --
Deliverables assessment form --
Preparing the test plan --
Test plan checklist --
Profiling test boundaries --
Defining business objectives --
Project management and scheduling --
Summary --
4. Information Gathering --
Public resources --
Document gathering --
Metagoofil --
DNS information --
dnswalk --
dnsenum --
dnsmap --
dnsmap-bulk --
dnsrecon --
fierce --
Route information --
0. trace --
dmitry --
itrace --
tcpraceroute --
tctrace --
Utilizing search engines --
goorecon --
theharvester
Series Title: Community experience distilled.
Other Titles: BackTrack four
Back Track 4
Assuring security by penetration testing
Responsibility: Shakeel Ali, Tedi Heriyanto.

Abstract:

Annotation

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network.<br /><br />BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today's digital age.<br /><br />The authors' experience and expertise enables them to reveal the industry's best approach for logical and systematic penetration testing.<br /><br />The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, maintaining access, and reporting), following the formal testing methodology. Each of these tools is illustrated with real-world examples to highlight their practical usage and proven configuration techniques. The authors also provide extra weaponry treasures and cite key resources that may be crucial to any professional penetration tester.<br /><br />This book serves as a single professional, practical, and expert guide to developing hardcore penetration testing skills from scratch. You will be trained to make the best use of BackTrack OS either in a commercial environment or an experimental test bed.<br /><br />A tactical example-driven guide for mastering the penetration testing skills with BackTrack to identify, detect, and exploit vulnerabilities at your digital doorstep.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/780165941> # BackTrack 4 : assuring security by penetration testing
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "780165941" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/3944854147#Place/birmingham_uk> ; # Birmingham, UK
    schema:about <http://id.worldcat.org/fast/872787> ; # Computers--Access control--Testing
    schema:about <http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_access_control_testing> ; # Computers / Access control / Testing
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/1382136> ; # Linux.
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://id.worldcat.org/fast/1789566> ; # Penetration testing (Computer security)
    schema:about <http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://id.loc.gov/authorities/subjects/sh2007008466> ; # Computers--Access control--Testing
    schema:about <http://experiment.worldcat.org/entity/work/data/3944854147#CreativeWork/linux> ; # Linux.
    schema:about <http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:alternateName "Back Track 4" ;
    schema:alternateName "BackTrack four" ;
    schema:alternateName "Assuring security by penetration testing" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/250344713> ; # Tedi Heriyanto
    schema:copyrightYear "2011" ;
    schema:creator <http://viaf.org/viaf/249691353> ; # Shakeel Ali
    schema:datePublished "2011" ;
    schema:description "Annotation"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/3944854147> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3944854147#Series/community_experience_distilled> ; # Community experience distilled.
    schema:isSimilarTo <http://www.worldcat.org/oclc/728008053> ;
    schema:name "BackTrack 4 : assuring security by penetration testing"@en ;
    schema:productID "780165941" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/780165941#PublicationEvent/birmingham_uk_packt_2011> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/3944854147#Agent/packt> ; # Packt
    schema:url <http://public.eblib.com/EBLPublic/PublicView.do?ptiID=950518> ;
    schema:url <http://er.llcc.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365677> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781849513944> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=365677> ;
    schema:url <https://library.aurora.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365677> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781849513944> ;
    schema:url <http://proquest.safaribooksonline.com/9781849513944> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=365677> ;
    schema:workExample <http://worldcat.org/isbn/9781849513951> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/780165941> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/3944854147#Place/birmingham_uk> # Birmingham, UK
    a schema:Place ;
    schema:name "Birmingham, UK" ;
    .

<http://experiment.worldcat.org/entity/work/data/3944854147#Series/community_experience_distilled> # Community experience distilled.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/780165941> ; # BackTrack 4 : assuring security by penetration testing
    schema:name "Community experience distilled." ;
    schema:name "Community experience distilled" ;
    .

<http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_access_control_testing> # Computers / Access control / Testing
    a schema:Intangible ;
    schema:name "Computers / Access control / Testing"@en ;
    schema:name "Computers--Access control--Testing"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3944854147#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2007008466> # Computers--Access control--Testing
    a schema:Intangible ;
    schema:name "Computers--Access control--Testing"@en ;
    .

<http://id.worldcat.org/fast/1382136> # Linux.
    a schema:CreativeWork ;
    schema:name "Linux." ;
    .

<http://id.worldcat.org/fast/1789566> # Penetration testing (Computer security)
    a schema:Intangible ;
    schema:name "Penetration testing (Computer security)"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872787> # Computers--Access control--Testing
    a schema:Intangible ;
    schema:name "Computers--Access control--Testing"@en ;
    .

<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=365677>
    rdfs:comment "from EBSCO Academic Collection" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://viaf.org/viaf/249691353> # Shakeel Ali
    a schema:Person ;
    schema:familyName "Ali" ;
    schema:givenName "Shakeel" ;
    schema:name "Shakeel Ali" ;
    .

<http://viaf.org/viaf/250344713> # Tedi Heriyanto
    a schema:Person ;
    schema:familyName "Heriyanto" ;
    schema:givenName "Tedi" ;
    schema:name "Tedi Heriyanto" ;
    .

<http://worldcat.org/isbn/9781849513951>
    a schema:ProductModel ;
    schema:isbn "1849513953" ;
    schema:isbn "9781849513951" ;
    .

<http://www.worldcat.org/oclc/728008053>
    a schema:CreativeWork ;
    rdfs:label "BackTrack 4." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/780165941> ; # BackTrack 4 : assuring security by penetration testing
    .

<https://library.aurora.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365677>
    rdfs:comment "Current AU students, faculty, and staff, click here for full text." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.