BackTrack 4: Assuring Security by Penetration Testing : Master the Art of Penetration Testing with BackTrack
Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually.If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Application Security attack BackTrack bytes Cisco client commandline configuration connection console to execute database default display dnsmap domain Dradis enumeration Ettercap execute the following exploit fingerprinting following command go to Backtrack hash host hping2 ICMP Information Gathering install interface inthe IP address Linux MAC address Maltego menu Metasploit meterpreter Methodology Manual OSSTMM module MySQL Netcat NeXpose community Nmap Open Source Security OpenVAS operating system Ophcrack options OWASP packet password payload penetration testing ping plugin port scanning Privilege Escalation protocol proxy Rainbowcrack request result scanner script security assessment Security Testing Methodology server Smb4k SNMP social engineering Source Security Testing SQL injection target machine targetdomain TCP/UDP Tcpdump tester Testing Methodology Manual testing process thetarget tothe tunneling update usage instruction username VirtualBox vulnerability assessment web application Windows Wireshark xprobe2