Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
BackTrack 5 Cookbook
Table of Contents
BackTrack 5 Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Up and Running with BackTrack
Introduction
Installing BackTrack to a hard disk drive
Getting ready
How to do it...
Installing BackTrack to a USB drive with persistent memory
Getting ready
How to do it...
Installing BackTrack on VirtualBox
Getting ready
How to do it...
Installing BackTrack using VMware Tools
Getting ready
How to do it...
How it works...
Fixing the splash screen
How to do it...
Changing the root password
How to do it...
Starting network services
Getting ready
How to do it...
Setting up the wireless network
How to do it...
How it works...
2. Customizing BackTrack
Introduction
Preparing kernel headers
Getting ready
How to do it...
Installing Broadcom drivers
Getting ready
How to do it...
Installing and configuring ATI video card drivers
Getting ready
How to do it...
Installing and configuring NVIDIA video card drivers
Getting ready
How to do it...
Applying updates and configuring extra security tools
How to do it...
Setting up ProxyChains
How to do it...
Directory encryption
How to do it...
How it works…
3. Information Gathering
Introduction
Service enumeration
How to do it...
Determining the network range
How to do it...
How it works...
Identifying active machines
How to do it...
Finding open ports
Getting ready
How to do it...
How it works…
There's more...
Operating system fingerprinting
Getting ready
How to do it...
Service fingerprinting
How to do it...
Threat assessment with Maltego
Getting ready
How to do it...
How it works...
There's more...
Mapping the network
How to do it...
How it works...
There's more...
4. Vulnerability Identification
Introduction
Installing, configuring, and starting Nessus
Getting ready
How to do it...
How it works...
There's more...
Nessus – finding local vulnerabilities
Getting ready
How to do it...
Nessus – finding network vulnerabilities
Getting ready
How to do it...
Nessus – finding Linux-specific vulnerabilities
Getting ready
How to do it...
Nessus – finding Windows-specific vulnerabilities
Getting ready
How to do it...
Installing, configuring, and starting OpenVAS
Getting ready
How to do it...
How it works...
There's more...
Using the OpenVAS Desktop
OpenVAS – finding local vulnerabilities
How to do it...
How it works...
There's more...
OpenVAS – finding network vulnerabilities
Getting ready
How to do it...
How it works...
There's more...
OpenVAS – finding Linux-specific vulnerabilities
Getting ready
How to do it...
How it works...
There's more...
OpenVAS – finding Windows-specific vulnerabilities
Getting ready
How to do it...
How it works...
There's more...
5. Exploitation
Introduction
Implementing exploits from BackTrack
How to do it...
How it works…
Installing and configuring Metasploitable
Getting ready
How to do it...
How it works...
Mastering Armitage – the graphical management tool for Metasploit
Getting ready
How to do it...
See also
Mastering the Metasploit Console (MSFCONSOLE)
Getting ready
How to do it...
There's more...
Mastering the Metasploit CLI (MSFCLI)
Getting ready
How to do it...
How it works...
There's more...
See also
Mastering Meterpreter
Getting ready
How to do it...
How it works...
There's more...
Metasploitable MySQL
Getting ready
How to do it...
How it works...
There's more...
Metasploitable PostgreSQL
Getting ready
How to do it...
How it works...
There's more...
Metasploitable Tomcat
Getting ready
How to do it...
How it works...
Metasploitable PDF
Getting ready
How to do it...
How it works...
Implementing the browser_autopwn module
Getting ready
How to do it...
How it works...
6. Privilege Escalation
Introduction
Using impersonation tokens
Getting ready
How to do it...
How it works...
Local privilege escalation attack
Getting ready
How to do it...
How it works...
Mastering the Social-Engineer Toolkit (SET)
How to do it...
How it works...
There's more...
Delivering your payload to the victim
Collecting victims' data
Getting ready
How to do it...
How it works...
There's more...
Cleaning up the tracks
Getting ready
How to do it...
How it works...
Creating a persistent backdoor
Getting ready
How to do it...
How it works...
Man-in-the-middle attack (MITM)
Getting ready
How to do it...
How it works...
7. Wireless Network Analysis
Introduction
Cracking a WEP wireless network
Getting ready
How to do it...
How it works...
Cracking a WPA/WPA2 wireless network
Getting ready
How to do it...
How it works...
Automating wireless network cracking
Getting ready
How to do it...
How it works...
Accessing clients using a fake AP
Getting ready
How to do it...
How it works...
URL traffic manipulation
How to do it...
How it works...
Port redirection
How to do it...
How it works...
Sniffing network traffic
Getting ready
How to do it...
How it works...
Accessing an e-mail by stealing cookies
How to do it...
How it works...
8. Voice over IP (VoIP)
Introduction
Using Svmap
Getting ready
How to do it...
How it works...
Finding valid extensions
Getting ready
How to do it...
How it works...
Monitoring, capturing, and eavesdropping on VoIP traffic
Getting ready
How to do it...
How it works...
Using VoIPong
Getting ready
How to do it...
How it works...
Mastering UCSniff
Getting ready
How to do it...
How it works...
Mastering Xplico
Getting ready
How to do it...
How it works...
Capturing SIP authentication
Getting ready
How to do it...
How it works...
There's more...
Mastering VoIP Hopper
Getting ready
How to do it...
Causing a denial of service
Getting ready
How to do it...
How it works...
Attacking VoIP using Metasploit
Getting ready
How to do it...
How it works...
Sniffing DECT phones
Getting ready
How to do it...
How it works...
9. Password Cracking
Introduction
Online password attacks
Getting ready
How to do it...
How it works...
Cracking HTTP passwords
Getting ready
How to do it...
Gaining router access
Getting ready
How to do it...
How it works...
There's more...
Types of modules
Password profiling
Getting ready
How to do it...
How it works...
There's more...
Cracking a Windows password using John the Ripper
Getting ready
How to do it...
How it works…
Using dictionary attacks
Getting ready
How to do it...
How it works...
Using rainbow tables
How to do it...
How it works...
Using NVIDIA Compute Unified Device Architecture (CUDA)
Getting ready
How to do it...
How it works…
Using ATI Stream
Getting ready
How to do it...
How it works…
Physical access attacks
Getting ready
How to do it...
How it works...
10. BackTrack Forensics
Introduction
Intrusion detection and log analysis
Getting ready
How to do it...
How it works...
There's more…
Recursive directory encryption/decryption
Getting ready
How to do it...
How it works…
Scanning for signs of rootkits
Getting ready
How to do it...
How it works…
There's more...
Useful alternative command options for chkrootkit
Useful alternative command options for rkhunter
Recovering data from a problematic source
Getting ready
How to do it...
How it works...
There's more...
Retrieving a Windows password
Getting ready
How to do it...
How it works...
Resetting a Windows password
Getting ready
How to do it...
Looking at the Windows registry entries
Getting ready
How to do it...
How it works...
Index
← Prev
Back
Next →
← Prev
Back
Next →