Have a personal or library account? Click to login
Penetration Testing with BackBox
This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.
This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing.
What you will learn
Perform reconnaissance and collect information about an unknown system
Perform vulnerability scanning, management, and assessment, as well as understand false positives
Understand how SQL injection attacks work and find injectable pages on a web server
Sniff the network to capture sensitive data and learn different methods of privilege escalation
Maintain permanent access on a target server once access is initially granted
Use exploitation tools like Metasploit to exploit the reported vulnerabilities
Learn how to document and generate reports from the entire auditing process