- BackTrack 4: Assuring Security by Penetration Testing
- Shakeel Ali Tedi Heriyanto
- 374字
- 2021-04-09 21:20:55
BackTrack purpose
BackTrack 4.0 contains a number of tools that can be used during your penetration testing process. The penetration testing tools included in Backtrack 4.0 can be categorized into the following:
- Information gathering: This category contains several tools that can be used to get information regarding a target DNS, routing, e-mail address, websites, mail server, and so on. This information is gathered from the available information on the Internet, without touching the target environment.
- Network mapping: This category contains tools that can be used to check the live host, fingerprint operating system, application used by the target, and also do portscanning.
- Vulnerability identification: In this category you can find tools to scan vulnerabilities (general) and in Cisco devices. It also contains tools to carry out fuzzing and analyze Server Message Block (SMB) and Simple Network Management Protocol (SNMP).
- Web application analysis: This category contains tools that can be used in auditing web application.
- Radio network analysis: To audit wireless networks, bluetooth and Radio Frequency Identifier (RFID), you can use the tools in this category.
- Penetration: This category contains tools that can be used to exploit the vulnerabilities found in the target machine.
- Privilege escalation: After exploiting the vulnerabilities and gaining access to the target machine, you can use tools in this category to escalate your privilege to the highest privilege.
- Maintaining access: Tools in this category will be able to help you in maintaining access to the target machine. You might need to get the highest privilege first before you can install tool to maintain access.
- Voice Over IP (VOIP): To analyze VOIP you can utilize the tools in this category.
BackTrack 4 also contains tools that can be used for:
- Digital forensics: In this category you can find several tools that can be used to do digital forensics such as acquiring hard disk image, carving files, and analyzing hard disk image. To use the tools provided in this category, you may want to choose Start BackTrack Forensics in the booting menu. Some practical forensic procedures require you to mount the internal hard disk and swap files in read-only mode to preserve evidence integrity.
- Reverse engineering: This category contains tools that can be used to debug a program or disassemble an executable file.
推薦閱讀
- iOS應用逆向與安全之道
- 中文版3ds Max 2016/VRay效果圖制作實戰基礎教程
- Oracle SQL Developer 2.1
- 中文版 Photoshop CC 從入門到精通
- 通達信炒股軟件從入門到精通(第2版)
- BlackBerry Enterprise Server 5 Implementation Guide
- 詳解AutoCAD 2022電氣設計(第6版)
- Seam 2 Web Development: LITE
- 精進PPT:PPT設計思維、技術與實踐(第3版)
- AutoCAD 2016中文版基礎教程(全圖解視頻版)
- SketchUP草圖繪制從新手到高手
- Deep Inside osCommerce: The Cookbook
- UML 2.0 in Action: A project/based tutorial
- 會聲會影X8 DV影片制作/編輯/刻盤實戰從入門到精通
- Photoshop圖像處理立體化教程:Photoshop 2021(微課版·第2版)