Book Image

BackTrack 5 Cookbook

By : Willie L. Pritchett, David De Smet
Book Image

BackTrack 5 Cookbook

By: Willie L. Pritchett, David De Smet

Overview of this book

<p>BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.<br /><br />"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.<br /><br />The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.<br /><br />We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.<br /><br />"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.</p>
Table of Contents (17 chapters)
BackTrack 5 Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Mastering UCSniff


In this recipe, we will examine UCSniff. UCSniff is a VoIP and IP security assessment tool. It is useful to security auditors because of its ability to quickly test for unauthorized eavesdropping of both VoIP phone and IP video calls.

UCSniff has two modes of operation:

  • Monitor mode: This mode runs a basic VoIP sniffer. Monitor mode is considered the safest mode of running UCSniff. However it's not very useful for penetration testing, in terms of risk assessment, because most VoIP networks will not have the settings in place to make the program useful.

  • Man-in-the-middle (MITM) mode: In this mode, UCSniff is ARP Poisoning the network. This is an actual attacking mode, and is the mode we will use during our demonstration. The MITM mode has a further two submodes:

    • Target mode: This mode enables the eavesdropping feature of UCSniff

    • Learning mode: This mode uses Ettercap and captures all traffic on the specified target

Getting ready

The following requirements need to be fulfilled...