Download Free BackTrack 5 Cookbook By Willie Pritchett ,David De Smet 2017

Fampidirana

Backtrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Backtrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.

Backtrack 5 Cookbook provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

The book begins by covering the installation of Backtrack 5 and setting up a virtual environment in which to perform your tests. We then explore recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP (VoIP), password cracking, and Backtrack forensics.

This book will serve as an excellent source of information for the security professional and novice equally. The book offers detailed descriptions and example recipes that allow you to quickly get up to speed on both Backtrack 5 and its usage in the penetration testing field.

Table of Contents

Chapter 1: Up and Running with BackTrack

Fampidirana

Installing BackTrack to a hard disk drive

Installing BackTrack to a USB drive with persistent memory

Installing BackTrack on VirtualBox

Installing BackTrack using VMware Tools

Fixing the splash screen

Changing the root password

Starting network services

Setting up the wireless network

Chapter 2: Customizing BackTrack

Fampidirana 25

Preparing kernel headers

Installing Broadcom drivers

Installing and configuring ATI video card drivers

Installing and configuring NVIDIA video card drivers

Applying updates and configuring extra security tools

Setting up ProxyChains

Directory encryption

Chapter 3: Information Gathering

Fampidirana

Service enumeration

Determining the network range

Identifying active machines

Finding open ports

Operating system fingerprinting

Service fingerprinting

Threat assessment with Maltego

Mapping the network

Chapter 4: Vulnerability Identification

Fampidirana

Installing, configuring, and starting Nessus

Nessus – finding local vulnerabilities

Nessus – finding network vulnerabilities

Nessus – finding Linux-specific vulnerabilities

Nessus – finding Windows-specific vulnerabilities

Installing, configuring, and starting OpenVAS

OpenVAS – finding local vulnerabilities

OpenVAS – finding network vulnerabilities

OpenVAS – finding Linux-specific vulnerabilities

OpenVAS – finding Windows-specific vulnerabilities

Chapter 5: Exploitation

Fampidirana

Implementing exploits from BackTrack

Installing and configuring Metasploitable

Mastering Armitage – the graphical management tool for Metasploit

Mastering the Metasploit Console (MSFCONSOLE)

Mastering the Metasploit CLI (MSFCLI)

Mastering Meterpreter

Metasploitable MySQL

Metasploitable PostgreSQL

Metasploitable Tomcat

Metasploitable PDF

Implementing the browser_autopwn module

Chapter 6: Privilege Escalation

Fampidirana

Using impersonation tokens

Local privilege escalation attack

Mastering the Social-Engineer Toolkit (SET)

Collecting victims’ data

Cleaning up the tracks

Creating a persistent backdoor

Man-in-the-middle attack (MITM)

Chapter 7: Wireless Network Analysis

Fampidirana

Cracking a WEP wireless network

Cracking a WPA/WPA2 wireless network

Automating wireless network cracking

Accessing clients using a fake AP

URL traffic manipulation 178

Port redirection

Sniffing network traffic

Accessing an e-mail by stealing cookies

Chapter 8: Voice over IP (VoIP)

Fampidirana

Using Svmap

Finding valid extensions

Monitoring, capturing, and eavesdropping on VoIP traffic

Using VoIPong

Mastering UCSniff

Mastering Xplico

Capturing SIP authentication

Mastering VoIP Hopper

Causing a denial of service

Attacking VoIP using Metasploit

Sniffing DECT phones

Chapter 9: Password Cracking

Fampidirana

Online password attacks

Cracking HTTP passwords

Gaining router access

Password profiling

Cracking a Windows password using John the Ripper

Using dictionary attacks

Using rainbow tables

Using NVIDIA Compute Unified Device Architecture (CUDA)

Using ATI Stream

Physical access attacks

Chapter 10: BackTrack Forensics

Fampidirana

Intrusion detection and log analysis

Recursive directory encryption/decryption

Scanning for signs of rootkits

Recovering data from a problematic source

Retrieving a Windows password

Resetting a Windows password

Looking at the Windows registry entries

Tags: #Backtrack 5 Cookbook pdf free Download #Kali Linux Cookbook pdf 2017

Download The C Book Mike Banahan Declan Brady Mark Doran
Download The C Book Mike Banahan Declan Brady Mark Doran
Introduction This book was written with two
Download Functional C By Pieter Hartel, Henk Muller
Download Functional C By Pieter Hartel, Henk Muller
Introduction The Computer Science Departments of many

Leave a reply "Download Free BackTrack 5 Cookbook By Willie Pritchett ,David De Smet 2017"

Tsy maintsy mamaky×

Top
css.php