Book Image

Penetration Testing with BackBox

By : Stefan Umit Uygur
Book Image

Penetration Testing with BackBox

By: Stefan Umit Uygur

Overview of this book

Table of Contents (15 chapters)

Starting with an unknown system


Now, let's say in the very beginning we have nothing but a public URL web address and we have no other information about this environment. So, it looks like we have to manage on our own to find out the information required in order to start our security assessment. Actually no, our assessment will begin precisely with this process by looking for the information to be gathered.

So, address given is www.example.com. Now, let's start to tweak around our BackBox Linux and navigate to BackBox | Auditing | Information Gathering. In the Network submenu, we have many tools that we can use for what we need here. This is because the network is where everything begins as we are in front of a remote system.

Automater

As its name suggests, Automater is an automated tool to give some basic information about the target. All we have to do is run Automater from the menu, and a shell with the options listed will appear as shown in the following screenshot:

The main interface of...