BackTrack 5 Cookbook
This course has been retired. Check out the alternatives below
-
What do you get with a Packt Subscription?
- Instant access to this title and 7,500+ eBooks & Videos
- Constantly updated with 100+ new titles each month
- Breadth and depth in over 1,000+ technologies
-
Up and Running with BackTrack
- Up and Running with BackTrack
- Introduction
- Installing BackTrack to a hard disk drive
- Installing BackTrack to a USB drive with persistent memory
- Installing BackTrack on VirtualBox
- Installing BackTrack using VMware Tools
- Fixing the splash screen
- Changing the root password
- Starting network services
- Setting up the wireless network
-
Customizing BackTrack
- Customizing BackTrack
- Introduction
- Preparing kernel headers
- Installing Broadcom drivers
- Installing and configuring ATI video card drivers
- Installing and configuring NVIDIA video card drivers
- Applying updates and configuring extra security tools
- Setting up ProxyChains
- Directory encryption
-
Information Gathering
- Information Gathering
- Introduction
- Service enumeration
- Determining the network range
- Identifying active machines
- Finding open ports
- Operating system fingerprinting
- Service fingerprinting
- Threat assessment with Maltego
- Mapping the network
-
Vulnerability Identification
- Vulnerability Identification
- Introduction
- Installing, configuring, and starting Nessus
- Nessus – finding local vulnerabilities
- Nessus – finding network vulnerabilities
- Nessus – finding Linux-specific vulnerabilities
- Nessus – finding Windows-specific vulnerabilities
- Installing, configuring, and starting OpenVAS
- OpenVAS – finding local vulnerabilities
- OpenVAS – finding network vulnerabilities
- OpenVAS – finding Linux-specific vulnerabilities
- OpenVAS – finding Windows-specific vulnerabilities
-
Exploitation
- Exploitation
- Introduction
- Implementing exploits from BackTrack
- Installing and configuring Metasploitable
- Mastering Armitage – the graphical management tool for Metasploit
- Mastering the Metasploit Console (MSFCONSOLE)
- Mastering the Metasploit CLI (MSFCLI)
- Mastering Meterpreter
- Metasploitable MySQL
- Metasploitable PostgreSQL
- Metasploitable Tomcat
- Metasploitable PDF
- Implementing the browser_autopwn module
-
Privilege Escalation
- Privilege Escalation
- Introduction
- Using impersonation tokens
- Local privilege escalation attack
- Mastering the Social-Engineer Toolkit (SET)
- Collecting victims' data
- Cleaning up the tracks
- Creating a persistent backdoor
- Man-in-the-middle attack (MITM)
-
Wireless Network Analysis
- Wireless Network Analysis
- Introduction
- Cracking a WEP wireless network
- Cracking a WPA/WPA2 wireless network
- Automating wireless network cracking
- Accessing clients using a fake AP
- URL traffic manipulation
- Port redirection
- Sniffing network traffic
- Accessing an e-mail by stealing cookies
-
Voice over IP (VoIP)
- Voice over IP (VoIP)
- Introduction
- Using Svmap
- Finding valid extensions
- Monitoring, capturing, and eavesdropping on VoIP traffic
- Using VoIPong
- Mastering UCSniff
- Mastering Xplico
- Capturing SIP authentication
- Mastering VoIP Hopper
- Causing a denial of service
- Attacking VoIP using Metasploit
- Sniffing DECT phones
-
Password Cracking
- Password Cracking
- Introduction
- Online password attacks
- Cracking HTTP passwords
- Gaining router access
- Password profiling
- Cracking a Windows password using John the Ripper
- Using dictionary attacks
- Using rainbow tables
- Using NVIDIA Compute Unified Device Architecture (CUDA)
- Using ATI Stream
- Physical access attacks
-
BackTrack Forensics
- BackTrack Forensics
- Introduction
- Intrusion detection and log analysis
- Recursive directory encryption/decryption
- Scanning for signs of rootkits
- Recovering data from a problematic source
- Retrieving a Windows password
- Resetting a Windows password
- Looking at the Windows registry entries