Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BackTrack 5 Cookbook

Buy
BackTrack 5 Cookbook, 9781849517386 (184951738X), Packt Publishing, 2012

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed step-by-step instructions on the usage of many of BackTrack's popular and not-so- popular tools

In Detail

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.

"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.

The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.

We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.

"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.

What will you learn from this book

  • Install and set up BackTrack 5 on multiple platforms
  • Customize BackTrack to fit your individual needs
  • Exploit vulnerabilities found with Metasploit
  • Locate vulnerabilities Nessus and OpenVAS
  • Provide several solutions to escalate privileges on a compromised machine
  • Learn how to use BackTrack in all phases of a penetration test
  • Crack WEP/WPA/WPA2 Encryption
  • Learn how to monitor and eavesdrop on VOIP networks

Approach

This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes.

Who this book is written for

This book is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers.

(HTML tags aren't allowed.)

Formal Methods: State of the Art and New Directions
Formal Methods: State of the Art and New Directions

The last decade has witnessed a modest but sustained increase in researching and applying formal methods. A number of well cited success stories are now available and provide strong evidence that formal methods can be effective and deployed in industrial-scale applications.

Through fundamental contributions from leading researchers, this...

How to Read a Balance Sheet: The Bottom Line on What You Need to Know about Cash Flow, Assets, Debt, Equity, Profit...and How It all Comes Together
How to Read a Balance Sheet: The Bottom Line on What You Need to Know about Cash Flow, Assets, Debt, Equity, Profit...and How It all Comes Together

Put the most valuable business tool to work for you!

The balance sheet is the key to everything--from efficient business operation to accurate assessment of a company’s worth. It’s a critical business resource--but do you know how to read it? How to Read a Balance Sheet breaks down the subject into...

Foundation ASP.NET for Flash
Foundation ASP.NET for Flash
ASP.NET 2.0 is the new version of Microsoft's groundbreaking server-side scripting language. There is currently a huge demand to integrate dynamic content into Flash websites and applications and, as a solid competitor to technologies such as JSP, PHP, and ColdFusion, ASP.NET is one of the most popular choices to achieve this.

Used in...


MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization (Network Business)
MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization (Network Business)

Understand the business case for deploying MPLS-based services and solutions

  • Provides network managers and architects a precise MPLS primer

  • Defines MPLS service problems and their associated solutions

  • ...
Physiological, Developmental and Behavioral Effects of Marine Pollution
Physiological, Developmental and Behavioral Effects of Marine Pollution

Synthesizing decades of work, but up-to-date, this book focuses on organism-level responses to pollutants by marine animals, mainly crustaceans, molluscs, and fishes. Emphasizing effects on physiological processes (feeding/digestion, respiration, osmoregulation), life-cycle (reproduction [including endocrine disruption], embryo...

Mobile Design Pattern Gallery, Color Edition
Mobile Design Pattern Gallery, Color Edition
To name something is to begin to understand it.

My five-year-old son, like many children, enjoys looking at clouds. A few weeks ago, he clued into the fact that different kinds of clouds had different names. And so, being of good geek stock, he proceeded to memorize them—cirrus, cumulus,
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy