Jump to content
Nytro

BackTrack 5 Cookbook

Recommended Posts

Posted

BackTrack 5

Cookbook

Over 80 recipes to execute many of the best known and

little known penetration testing aspects of BackTrack 5

Willie Pritchett

David De Smet

backtrack_5_cookbook.jpg

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

- Learn to perform penetration tests with BackTrack 5

- Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools

- Provides detailed step-by-step instructions on the usage of many of BackTrack's popular and not-so- popular tools

In Detail

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.

"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.

The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.

We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.

"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.

What will you learn from this book:

- Install and set up BackTrack 5 on multiple platforms

- Customize BackTrack to fit your individual needs

- Exploit vulnerabilities found with Metasploit

- Locate vulnerabilities Nessus and OpenVAS

- Provide several solutions to escalate privileges on a compromised machine

- Learn how to use BackTrack in all phases of a penetration test

- Crack WEP/WPA/WPA2 Encryption

- Learn how to monitor and eavesdrop on VOIP networks

Download:

https://cdn.anonfiles.com/1358842982481.pdf

Sursa: Data 4 Instruction: BackTrack 5 Cookbook

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...