Ethical hacking and penetration testing guide. (2014)
- Record Type:
- Book
- Title:
- Ethical hacking and penetration testing guide. (2014)
- Main Title:
- Ethical hacking and penetration testing guide
- Further Information:
- Note: Rafay Baloch.
- Authors:
- Baloch, Rafay
- Contents:
- Introduction to Hacking; Important Terminologies; Asset; Vulnerability; Threat; Exploit; Risk; What Is a Penetration Test?; Vulnerability Assessments versus Penetration Test; Pre-Engagement; Rules of Engagement; Milestones; Penetration Testing Methodologies; OSSTMM; NIST; OWASP; Categories of Penetration Test; Black Box; White Box; Gray Box; Types of Penetration Tests; Network Penetration Test; Web Application Penetration Test; Mobile Application Penetration Test; Social Engineering Penetration Test; Physical Penetration Test; Report Writing; Understanding the Audience; Executive Class; Management Class; Technical Class; Writing Reports; Structure of a Penetration Testing Report; Cover Page; Table of Contents; Executive Summary; Remediation Report; Vulnerability Assessment Summary; Tabular Summary; Risk Assessment; Risk Assessment Matrix; Methodology; Detailed Findings; Description; Explanation; Risk; Recommendation; Reports; Conclusion; ; Linux Basics; Major Linux Operating Systems; File Structure inside of Linux; Permissions in Linux; Special Permissions; Users inside of Linux; Linux Services; Linux Password Storage; Linux Logging; Common Applications of Linux; What Is BackTrack?; How to Get BackTrack 5 Running?; Installing BackTrack on Virtual Box; Installing BackTrack on a Portable USB; Installing BackTrack on Your Hard Drive; BackTrack Basics; Changing the Default Screen Resolution; Some Unforgettable Basics; Changing the Password; Clearing the Screen; Listing theIntroduction to Hacking; Important Terminologies; Asset; Vulnerability; Threat; Exploit; Risk; What Is a Penetration Test?; Vulnerability Assessments versus Penetration Test; Pre-Engagement; Rules of Engagement; Milestones; Penetration Testing Methodologies; OSSTMM; NIST; OWASP; Categories of Penetration Test; Black Box; White Box; Gray Box; Types of Penetration Tests; Network Penetration Test; Web Application Penetration Test; Mobile Application Penetration Test; Social Engineering Penetration Test; Physical Penetration Test; Report Writing; Understanding the Audience; Executive Class; Management Class; Technical Class; Writing Reports; Structure of a Penetration Testing Report; Cover Page; Table of Contents; Executive Summary; Remediation Report; Vulnerability Assessment Summary; Tabular Summary; Risk Assessment; Risk Assessment Matrix; Methodology; Detailed Findings; Description; Explanation; Risk; Recommendation; Reports; Conclusion; ; Linux Basics; Major Linux Operating Systems; File Structure inside of Linux; Permissions in Linux; Special Permissions; Users inside of Linux; Linux Services; Linux Password Storage; Linux Logging; Common Applications of Linux; What Is BackTrack?; How to Get BackTrack 5 Running?; Installing BackTrack on Virtual Box; Installing BackTrack on a Portable USB; Installing BackTrack on Your Hard Drive; BackTrack Basics; Changing the Default Screen Resolution; Some Unforgettable Basics; Changing the Password; Clearing the Screen; Listing the Contents of a Directory; Displaying Contents of a Specific Directory; Displaying the Contents of a File; Creating a Directory; Changing the Directories; Windows; Linux; Creating a Text File; Copying a File; Current Working Directory; Renaming a File; Moving a File; Removing a File; Locating Certain Files inside BackTrack; Text Editors inside BackTrack; Getting to Know Your Network; Dhclient; Services; MySQL; SSHD; Postgresql; Other Online Resources; ; Information Gathering Techniques; Active Information Gathering; Passive Information Gathering; Sources of Information Gathering; Copying Websites Locally; Information Gathering with Whois; Finding Other Websites Hosted on the Same Server; YouGetSignal.com; Tracing the Location; Traceroute; ICMP Traceroute; TCP Traceroute; Usage; UDP Traceroute; Usage; NeoTrace; Cheops-ng; Enumerating and Fingerprinting the Webservers; Intercepting a Response; Acunetix Vulnerability Scanner; WhatWeb; Netcraft; Google Hacking; Some Basic Parameters; Site; Example; TIP regarding Filetype; Google Hacking Database; Hackersforcharity.org/ghdb; Xcode Exploit Scanner; File Analysis; Foca; Harvesting E-Mail Lists; Gathering Wordlist from a Target Website; Scanning for Subdomains; TheHarvester; Fierce in BackTrack; Scanning for SSL Version; DNS Enumeration; Interacting with DNS Servers; Nslookup; DIG; Forward DNS Lookup; Forward DNS Lookup with Fierce; Reverse DNS; Reverse DNS Lookup with Dig; Reverse DNS Lookup with Fierce; Zone Transfers; Zone Transfer with Host Command; Automating Zone Transfers; DNS Cache Snooping; What Is DNS Cache Snooping?; Nonrecursive Method; Recursive Method; What Is the Likelihood of Name Servers Allowing Recursive/Nonrecursive Queries?; Attack Scenario<BR& … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Auerbach
- Publication Date:
- 2014
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 005.8
Penetration testing (Computer security) - Languages:
- English
- ISBNs:
- 9781482231625
- Related ISBNs:
- 9781482231618
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; item not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.144319
- Ingest File:
- 02_101.xml