We have tried to explore the amazing tool named Weevely in this chapter by using it practically in a real web server environment. By just listing the modules/options offered by Weevely, we can only imagine what this tool is capable of. We will leave it to the users to try/test and perform the full functionality of this tool (knowing now how easy the usage is). Well, this is all for now; let's go to the next chapter where we will run a full penetration test case by going through all the previous chapters.
Penetration Testing with BackBox
By :
Penetration Testing with BackBox
By:
Overview of this book
Table of Contents (15 chapters)
Penetration Testing with BackBox
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Starting Out with BackBox Linux
Information Gathering
Vulnerability Assessment and Management
Exploitations
Eavesdropping and Privilege Escalation
Maintaining Access
Penetration Testing Methodologies with BackBox
Documentation and Reporting
Index
Customer Reviews