That's it for this chapter. We have a little bit about how to collect information about unknown systems and made ourselves more aware about them. In the next chapter, we will show you how to use the information collected in further detail and perform vulnerability analysis and management/assessment.
Penetration Testing with BackBox
By :
Penetration Testing with BackBox
By:
Overview of this book
Table of Contents (15 chapters)
Penetration Testing with BackBox
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Starting Out with BackBox Linux
Information Gathering
Vulnerability Assessment and Management
Exploitations
Eavesdropping and Privilege Escalation
Maintaining Access
Penetration Testing Methodologies with BackBox
Documentation and Reporting
Index
Customer Reviews