Book Image

BackTrack 5 Cookbook

By : Willie L. Pritchett, David De Smet
Book Image

BackTrack 5 Cookbook

By: Willie L. Pritchett, David De Smet

Overview of this book

<p>BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.<br /><br />"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.<br /><br />The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.<br /><br />We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.<br /><br />"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.</p>
Table of Contents (17 chapters)
BackTrack 5 Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Using Svmap


In this recipe, we will utilize Svmap to identify SIP and PBX devices on our target network. Svmap can also be utilized to make an inventory of all of the devices on a network. Svmap is a part of the SIPVicious suite of tools that were created in Python to audit VoIP systems and networks supporting the protocol.

Svmap has the ability to perform the following tasks:

  • Locate and identify SIP devices using both their normal port settings or their non-default settings. This feature is useful in cases where different ports were used on the network than originally specified by the manufacturer.

  • Locate SIP devices on multiple hosts and multiple ports, or single hosts scanning multiple ports. This makes it very useful for a wide range of network layouts.

  • Resume previous scans. This is useful if you ever need to stop the program for any reason; you will be able to pick up from where you left off.

Getting ready

The following requirements need to be fulfilled:

  • You will need an Internet or intranet...