coverpage
Penetration Testing with BackBox
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Starting Out with BackBox Linux
A flexible penetration testing distribution
The organization of tools in BackBox
Services
Update
Anonymous
Extras
Completeness accuracy and support
Links and contacts
Summary
Chapter 2. Information Gathering
Starting with an unknown system
Proceeding with a known system
Summary
Chapter 3. Vulnerability Assessment and Management
Vulnerability scanning
False positives
Summary
Chapter 4. Exploitations
Exploitation of a SQL injection on a database
Exploiting web applications with W3af
Summary
Chapter 5. Eavesdropping and Privilege Escalation
Sniffing encrypted SSL/TLS traffic
Password cracking
Summary
Chapter 6. Maintaining Access
Backdoor Weevely
Summary
Chapter 7. Penetration Testing Methodologies with BackBox
Information gathering
Summary
Chapter 8. Documentation and Reporting
MagicTree – the auditing productivity tool
Summary
Index
更新时间:2021-07-19 18:19:02