官术网_书友最值得收藏!

Summary

In this chapter, we focused on all that is necessary to prepare and plan for a successful penetration test. We discussed the differences between penetration testing and vulnerability assessments.

The steps involved with proper scoping were detailed, as were the necessary steps to ensure all information has been gathered prior to testing. One thing to remember is that proper scoping and planning is just as important as ensuring you test against the latest and greatest vulnerabilities.

We have also discussed the installation of VirtualBox and BackTrack and have provided the instructions necessary to not only install BackTrack from the ISO, but also how to keep it updated. In addition to this, we have also provided instructions on how to install OpenOffice on BackTrack.

Last but not least, we have discussed two very powerful tools that allow you to perform data collections and that offer reporting features. MagicTree, which is a powerhouse of data collection and analysis, and Dradis, which is incredible in its ability to allow for centralized data collection and sharing.

In the next chapter, we learn about various reconnaissance techniques and why they are needed. Some of these include effective use of Internet search engines to locate company and employee data, manipulating and reading metadata from various file types, and fully exploiting the power of DNS to make the task of penetration testing easier.

主站蜘蛛池模板: 射洪县| 东丽区| 尚志市| 萨迦县| 普兰县| 松滋市| 张家界市| 兴文县| 宝丰县| 容城县| 黄梅县| 蚌埠市| 尚义县| 建始县| 马公市| 丹寨县| 建昌县| 大邑县| 万山特区| 如东县| 岳普湖县| 宜都市| 宣威市| 三都| 赤城县| 东辽县| 宁阳县| 凭祥市| 洛扎县| 荃湾区| 兴安盟| 友谊县| 井冈山市| 长岭县| 喀喇| 伊吾县| 二连浩特市| 无为县| 杭锦旗| 佛教| 华亭县|