• Out-of-Stock
Penetration Tester's Open Source Toolkit
search
  • Penetration Tester's Open Source Toolkit
ID: 174205
Jeremy Faircloth, Chris Hurley
Delivery date unknown
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative, to be sure to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all other Open Source platforms.

. Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
. Demystify Enumeration and Scanning
Identify the purpose and type of target systems.
. Hack Database Services
Understand and identify common database service vulnerabilities, analyze the database, access to the host system.
. Test Web Servers and Applications
Compromise the Web server due to the vulnerability of the web daemon itself.
. Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
. Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.
. Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
. Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
. Build Your Own PenTesting Lab
Everything you need to build your own is a fully functional attack lab.

Defining the Scope
ISSAF and OSSTMM
Metasploit v3
BackTrack v2
Kismet
IDS Toolkits: WireShark, Snort, Nessus
Tools: Bluebugger, Wyd, SIPcrack
Fuzzing Tools
Testing Web Applications
botnets
174205

Other products in the same category (16)