V
Verification (reconnaissance phase)
Google's IP ARIN record example
78f
,
79fnetwork boundary exploration
78–79reverse DNS verification
79–81Vertical scalability, enterprise applications
292–293View, database definition
191Virtual access points (VAPs), Aireplay-ng
346VirtualBox, pen-test lab
395
,
401Virtual Internet Protocol (IP) address, IRPAS
282Virtual Internet Service Providers (vISPs), LIRs
75–76Virtualization software, pen-test lab
Virtual machine (VM)
BackTrack toolkit creation case study
24pen-test lab case study
397Virtual Network Computing (VNC)
pen-test lab case study
399Virtual penetration test lab, basic considerations
382Virtual private network (VPN)
Virtual table, database definition
191Viruses, virtual pen-test lab
382Virus scanners, msfencode
178Vitality (reconnaissance phase), definition
32t–33tVMware
ESXi virtual machines
399fpen-test lab case study
397stealthy penetration test case study
135–136VMware Infrastructure Client, pen-test lab case study
398f
,
399Vulnerability assessment
web applications
cross-site scripting attacks
233database query injection attacks
232directory traversal attacks
231information gathering attacks
231parameter passing attacks
233web servers
CGI and default page exploitations
230wireless penetration testing tools
342–343VulnerabilityAssessment.co.uk, penetration testing framework
390