Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
BackTrack 5 Cookbook
Table of Contents BackTrack 5 Cookbook Credits About the Authors About the Reviewers www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe? Free Access for Packt account holders
Preface
What this book covers What you need for this book Who this book is for Conventions Reader feedback Customer support
Errata Piracy Questions
1. Up and Running with BackTrack
Introduction Installing BackTrack to a hard disk drive
Getting ready How to do it...
Installing BackTrack to a USB drive with persistent memory
Getting ready How to do it...
Installing BackTrack on VirtualBox
Getting ready How to do it...
Installing BackTrack using VMware Tools
Getting ready How to do it... How it works...
Fixing the splash screen
How to do it...
Changing the root password
How to do it...
Starting network services
Getting ready How to do it...
Setting up the wireless network
How to do it... How it works...
2. Customizing BackTrack
Introduction Preparing kernel headers
Getting ready How to do it...
Installing Broadcom drivers
Getting ready How to do it...
Installing and configuring ATI video card drivers
Getting ready How to do it...
Installing and configuring NVIDIA video card drivers
Getting ready How to do it...
Applying updates and configuring extra security tools
How to do it...
Setting up ProxyChains
How to do it...
Directory encryption
How to do it... How it works…
3. Information Gathering
Introduction Service enumeration
How to do it...
Determining the network range
How to do it... How it works...
Identifying active machines
How to do it...
Finding open ports
Getting ready How to do it... How it works… There's more...
Operating system fingerprinting
Getting ready How to do it...
Service fingerprinting
How to do it...
Threat assessment with Maltego
Getting ready How to do it... How it works... There's more...
Mapping the network
How to do it... How it works... There's more...
4. Vulnerability Identification
Introduction Installing, configuring, and starting Nessus
Getting ready How to do it... How it works... There's more...
Nessus – finding local vulnerabilities
Getting ready How to do it...
Nessus – finding network vulnerabilities
Getting ready How to do it...
Nessus – finding Linux-specific vulnerabilities
Getting ready How to do it...
Nessus – finding Windows-specific vulnerabilities
Getting ready How to do it...
Installing, configuring, and starting OpenVAS
Getting ready How to do it... How it works... There's more...
Using the OpenVAS Desktop
OpenVAS – finding local vulnerabilities
How to do it... How it works... There's more...
OpenVAS – finding network vulnerabilities
Getting ready How to do it... How it works... There's more...
OpenVAS – finding Linux-specific vulnerabilities
Getting ready How to do it... How it works... There's more...
OpenVAS – finding Windows-specific vulnerabilities
Getting ready How to do it... How it works... There's more...
5. Exploitation
Introduction Implementing exploits from BackTrack
How to do it... How it works…
Installing and configuring Metasploitable
Getting ready How to do it... How it works...
Mastering Armitage – the graphical management tool for Metasploit
Getting ready How to do it... See also
Mastering the Metasploit Console (MSFCONSOLE)
Getting ready How to do it... There's more...
Mastering the Metasploit CLI (MSFCLI)
Getting ready How to do it... How it works... There's more... See also
Mastering Meterpreter
Getting ready How to do it... How it works... There's more...
Metasploitable MySQL
Getting ready How to do it... How it works... There's more...
Metasploitable PostgreSQL
Getting ready How to do it... How it works... There's more...
Metasploitable Tomcat
Getting ready How to do it... How it works...
Metasploitable PDF
Getting ready How to do it... How it works...
Implementing the browser_autopwn module
Getting ready How to do it... How it works...
6. Privilege Escalation
Introduction Using impersonation tokens
Getting ready How to do it... How it works...
Local privilege escalation attack
Getting ready How to do it... How it works...
Mastering the Social-Engineer Toolkit (SET)
How to do it... How it works... There's more...
Delivering your payload to the victim
Collecting victims' data
Getting ready How to do it... How it works... There's more...
Cleaning up the tracks
Getting ready How to do it... How it works...
Creating a persistent backdoor
Getting ready How to do it... How it works...
Man-in-the-middle attack (MITM)
Getting ready How to do it... How it works...
7. Wireless Network Analysis
Introduction Cracking a WEP wireless network
Getting ready How to do it... How it works...
Cracking a WPA/WPA2 wireless network
Getting ready How to do it... How it works...
Automating wireless network cracking
Getting ready How to do it... How it works...
Accessing clients using a fake AP
Getting ready How to do it... How it works...
URL traffic manipulation
How to do it... How it works...
Port redirection
How to do it... How it works...
Sniffing network traffic
Getting ready How to do it... How it works...
Accessing an e-mail by stealing cookies
How to do it... How it works...
8. Voice over IP (VoIP)
Introduction Using Svmap
Getting ready How to do it... How it works...
Finding valid extensions
Getting ready How to do it... How it works...
Monitoring, capturing, and eavesdropping on VoIP traffic
Getting ready How to do it... How it works...
Using VoIPong
Getting ready How to do it... How it works...
Mastering UCSniff
Getting ready How to do it... How it works...
Mastering Xplico
Getting ready How to do it... How it works...
Capturing SIP authentication
Getting ready How to do it... How it works... There's more...
Mastering VoIP Hopper
Getting ready How to do it...
Causing a denial of service
Getting ready How to do it... How it works...
Attacking VoIP using Metasploit
Getting ready How to do it... How it works...
Sniffing DECT phones
Getting ready How to do it... How it works...
9. Password Cracking
Introduction Online password attacks
Getting ready How to do it... How it works...
Cracking HTTP passwords
Getting ready How to do it...
Gaining router access
Getting ready How to do it... How it works... There's more...
Types of modules
Password profiling
Getting ready How to do it... How it works... There's more...
Cracking a Windows password using John the Ripper
Getting ready How to do it... How it works…
Using dictionary attacks
Getting ready How to do it... How it works...
Using rainbow tables
How to do it... How it works...
Using NVIDIA Compute Unified Device Architecture (CUDA)
Getting ready How to do it... How it works…
Using ATI Stream
Getting ready How to do it... How it works…
Physical access attacks
Getting ready How to do it... How it works...
10. BackTrack Forensics
Introduction Intrusion detection and log analysis
Getting ready How to do it... How it works... There's more…
Recursive directory encryption/decryption
Getting ready How to do it... How it works…
Scanning for signs of rootkits
Getting ready How to do it... How it works… There's more...
Useful alternative command options for chkrootkit Useful alternative command options for rkhunter
Recovering data from a problematic source
Getting ready How to do it... How it works... There's more...
Retrieving a Windows password
Getting ready How to do it... How it works...
Resetting a Windows password
Getting ready How to do it...
Looking at the Windows registry entries
Getting ready How to do it... How it works...
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion