Escolar Documentos
Profissional Documentos
Cultura Documentos
James Broad
Syngress 169
CHAPTERS
CHAPTER CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 NAME OF CHAPTER What is Penetration Testing? Reconnaissance Scanning Exploitation Web Based Exploitation Maint Access with Back Doors & RootKits PAGES 1 15 43 65 107
CHAPTER 6 CHAPTER 7
127 145
Wrapping up
4 STEP METHODOLGY
RECONNAISSANCE
INTRO
SCANNING
RECONNAISSANCE
HTTrack GOOGLE HARVESTER DIRECTIVES NETCRAFT HOST METAGooFI
GOOGLE FU
Strong Search Engine Directives
SEAT
Search Engine Assessment Tool SEAT
JOHNNY LONG
Single Repository Most Feared Google Hack
PATREVAs MALETEGO
Aggregates info from public data base
SCANNING
BRIEF OVER VIEW OF PINGS & PING SWEEPS PORTs
VULNERABILITY
EXPLOITATION
METASPOLIT
DSNIFF
Remote services
MEDUSA
Powerful Proven
JOHN : THE RIPPER
Collection of tools
Security Testing
FAST TRACK AUTOPWN
NIKTO
WEB SECURIFY
CRAWLING & INTERCEPTING
WEBSCARAB
BROWSERS
OWASP
CSS
CSRF
MAINT ACCESS
Data across Network Connections Networking utility NETCAT NETBUS Remotely Controlling
HACKER DEFENDER
Rootkit battle
WRAPPING UP
WRAPPING UP THE PEN TEST
PEN TEST REPORT
EXEC SUMMARY
DETAILED REPORT WRAP UP
RAW OUTPUT
TRUE CRYPT 7 ZIP