Book description
Penetration testing remains one of the best ways to test the security of private, government, military and corporate computer networks. This book provides step-by-step instruction on how to use tools, available mostly for free, to perform effective penetration tests of today's computer networks. Covering basic and advanced tools and procedures, it categorizes tools according to their use within the standard testing framework. Readers will learn how to perform an organized and efficient penetration test as well as techniques used to bypass anti-virus software and capture keystrokes of remote systems.
Table of contents
- Preface
- About the Author
- Chapter 1 - What You Need to Know First
- Chapter 2 - Attack from Christmas Island
- Chapter 3 - Indirect Target Information Acquisition (ITIA)
- Chapter 4 - Direct Target Information Acquisition (DTIA)
-
Chapter 5 - Nmap
- Nmap -T0 -O -sTV -vv -p- -PN IP
- Nmap -O -sSV -vv -p- -PN IP
- Nmap–script http-enum,http-headers,http-methods,http-php-version -p 80 IP
- Nmap -A -vvv -p- -PN -iL IPlist.txt
- Nmap -f -f -vvv -p- -PN IP
- Nmap -sP -PA IP.0/24
- Nmap -sS -sU -p U:53,T:22,134-139 IP
- Nmap -O -sUV -vvv -p- -PN IP
- Nmap -O -sXV -vvv -p- -PN IP
- Nmap -O -sNV -vvv -p- -PN IP
- Nmap -mtu 16 -vvv -p- -PN IP
- Nmap -sM -vvv -p- -PN IP
- Nmap -sC -p- -PN IP
- Nmap -p 139,445 IP
- Nmap -scanflags PSH -p- -PN IP
- Nmap -scanflags PSH -p135 IP
- Nmap -scanflags SYN -p135 IP
- Nmap -sA -scanflags PSH -p- -PN IP
- Nmap -sP IP.0/24 -oA Results
- Nmap -sP -PA -oN Results IP.0/24
- Nmap -n -sP 192.168.4.1-20
- Nmap -sP -oG Results IP.0/24
- Nmap -v -sP 192.168.0.0/16 10.0.0.0/8
- Nmap -sP -PN -PS -reason IP
- Nmap -sL IP.1-255
- Nmap -sS -sV -O -v IP
- Nmap -T0 -vv -b FTP_IP TARGET_IP -oA Results
- Nmap -sF -PN -p22 IP
- Nmap -sU -p0-65535 IP
- Nmap -sU -v -p 1-65535 IP
- Nmap -sU -p 161
- Nmap -sU -T5 -p 69, 123, 161, 1985 IP
- Nmap -PP -PM IP
- Chapter 6 - MATLAB, SimuLink, and R
-
Chapter 7 - Metasploit Pro
- Now Verify Database Connectivity with Metasploit
- Perform an Nmap Scan within Metasploit
- Using Auxiliary Modules in Metasploit
- Using Metasploit to Exploit
- If You Get an Error While Connecting to the DB
- Using the DB to Store Pen Test Results
- Analyzing Stored Results of DB
- Unfiltered Port
- Using Metasploit Auxiliary Module for Scans
- To Make the Scan Faster across Multiple Devices
- Target Services Scanning with Auxiliary Modules
- Vulnerability Scan with Metasploit Using Nessus
- Scanning with Nexpose within Metasploit:
- Note about Exploit-db
- Some Metasploit Exploit Commands
- Microsoft Exploit
- Exploiting a Windows 2003 Server
- Exploiting Windows 7/Server 2008 R2 SMB Client
- Exploiting Linux Ubuntu System
- Client Side Exploitation and A/V Bypass
- Msfpayload Can Be Used to Generate Binary and Shellcode
- To Set Up a Listener for the Reverse Connection
- Run Some Linux PPC Payloads against the FSB
- Generate Shellcode in C
- Meterpreter Commands
- Executive Summary
- Detailed Findings
- Recommendations to Resolve Issues
- Chapter 8 - China, Syria, and the American Intelligence Community
- Chapter 9 - Building a Penetration Testing Lab
- Chapter 10 - Vendor Default Passwords and Default Unix Ports
-
Chapter 11 - Oldies but Goodies If You Have Physical Access
- SafeBack
- GetTime
- FileList and FileCnvt and Excel
- GetFree
- Swap Files and GetSwap
- GetSlack
- Temporary Files
- Filter_I
- Keyword Generation
- TextSearch Plus
- Crcmd5
- DiskSig
- Doc
- Mcrypt
- Micro-Zap
- Map
- M-Sweep
- Net Threat Analyzer
- AnaDisk
- Seized
- Scrub
- Spaces
- NTFS FileList
- NTFS GetFree
- NTFS GetSlack
- NTFS VIEW
- NTFS Check
- NTIcopy
- Disk Search 32
- Chapter 12 - Order of Operations for Your Tools
- Chapter 13 - Using Your iPhone as a Network Scanner
Product information
- Title: Conducting Network Penetration and Espionage in a Global Environment
- Author(s):
- Release date: April 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781498760294
You might also like
book
Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security Most …
book
Hack I.T.: Security Through Penetration Testing
"This book covers not just the glamorous aspects such as the intrusion act itself, but all …
book
Google Hacking for Penetration Testers
This book helps people find sensitive information on the Web. Google is one of the 5 …
book
Web Hacking: Attacks and Defense
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking …