How to Use Backtrack for Vulnerability Management? Hakin9 Extra 01/2013
BACKTRACK 5R3 EXPLORED
Why Do Hackers Use Backtrack?
By William F. Slater, III
Backtrack distribution has quickly risen to the position of becoming the de facto hacker’s tool for network infrastructures. William F. Slater, III introduces you to Backtrack Linux. His article is not a Backtrack user guide, nor is it a User Guide for any or all the tools that are available in Backtrack Linux. His article shows how to use it to make your organization more secure.
Backtrack Linux – How to Ditch the Menu and Ball from the Command Line?
By Alex Kah
The Backtrack menus already provide an overwhelming amount of tools that will allow you to accomplish almost anything you need in a penetration test or security audit. However, if you never get past the Backtrack menu system, you will be doing yourself a huge disservice. If you want to advance to the next level in your career break away from the norm and explore. Alex Kah in his article provides you with examples of various tools available from the command line in Backtrack Linux.
BACKTRACK 5R3 TOOLS
How to Use OpenVAS (Vulnerability Assessment System)?
By Willie Pritchett
Penetration testers or ethical hackers are probably aware of scanning and identifying vulnerabilities on the target network, Open Vulnerability Assessment System (OpenVAS) is one of the most widely used open source solutions available. It is an excellent alternative to Nessus and offers its updates free of charge. Willie Pritchett examines how to install, configure, and start OpenVAS along with running a scan across a network to assess the vulnerabilities of Windows systems.
How to Use Backtrack and Nessus for Vulnerability Management?
By Guglielmo Scaiola
Ethical Hacking and Penetration Testing are fun but what’s the business value of these activities? What’s the reason that motivates a manager to pay us to hack their network? What’s the ultimate goal? Guglielmo Scaiola believes that this is possible only for a reason that penetration testing is a part of the vulnerability management process. This process is the key of enterprise security.
Backtrack Linux – How to Configure A Metasploit Development System?
By Royce Davis
Backtrack Linux has long since transcended the classification of being a mere Linux Live CD. BT5R3 is a full-fledged Linux distro, which is more then capable of performing as a standalone workstation operating system. Royce Davis in his article presents the necessary steps to get off the ground and running full speed with Backtrack as a developmental platform for the awesome Metasploit Framework. He describes all of the proper settings to install and configure the tools that it is very useful when building extensions to the already expansive Metasploit Framework. Royce Davis covers the following topics: The Ruby Versioning Manager (RVM), Git & The Github, Vim Basic Operations, Vim Configuration & Plugins, The Anatomy of a Metasploit Module, Navigating the Metasploit Framework and submitting your module to the rapid7 dev team for merger into the framework.
HACKING WITH BACKTRACK 5R3
How Do I phish? Advanced Email Phishing Tactics
By Brandon McCann
Email phishing attacks are very compelling and unique to each situation. The process of creating a successful email phishing campaign is very methodical and most of the time and effort goes up front into the planning phase. Brandon McCann in his article answers to your most frequently asked question how to perform email phishing attacks.
How to Brute-force Drupal6 Login Pages?
By Kevin Simons
Authentication is a protocol or process that allows an entity or system to validate your identity. Nowadays, we see a variety of authentication protocols/processes. We have two-factor authentication which basically comes to identification based on what you know (pin) and what you have (bank card). But with online banking systems it might even go further and you end up with multiple factor authentication. Usually, it comes to either using
a digipass system or a bank card system that provides you with a one-time pin of usually 8 characters. Kevin Simons in looks for the password models which are the simplest authentication models to implement.
How to Conduct VPN Pivoting?
By Ayman Hammoudeh
Pivoting refers to the method used by penetration testers that uses compromised system to attack other systems on the same network in order to avoid restrictions such as firewall configurations, which may prohibit direct access to all machines. VPN pivoting enables the attacker to create an encrypted layer 2 tunnel into the compromised machine to route any network traffic through that target machine, for example to run a vulnerability scan on the internal network through the compromised machine, effectively giving the attacker full network access as if they were behind the firewall. Ayman Hammoudeh presents how to conduct VPN Pivoting.