Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Ethical hacking and penetration testing guide
Nội dung xem thử
Mô tả chi tiết
ETHICAL HACKING
AND PENETRATION
TESTING GUIDE
RAFAY BALOCH
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2015 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed on acid-free paper
Version Date: 20140320
International Standard Book Number-13: 978-1-4822-3161-8 (Paperback)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Library of Congress Cataloging‑in‑Publication Data
Baloch, Rafay.
Ethical hacking and penetration testing guide / Rafay Baloch.
pages cm
Includes bibliographical references and index.
ISBN 978-1-4822-3161-8 (paperback)
1. Penetration testing (Computer security) I. Title.
QA76.9.A25B356 2014
005.8--dc23 2014006695
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
v
Contents
Preface............................................................................................................................. xxiii
Acknowledgments.............................................................................................................xxv
Author.............................................................................................................................xxvii
1 Introduction to Hacking ..............................................................................................1
Important Terminologies................................................................................................... 2
Asset......................................................................................................................... 2
Vulnerability............................................................................................................. 3
Threat....................................................................................................................... 3
Exploit...................................................................................................................... 3
Risk .......................................................................................................................... 3
What Is a Penetration Test? ...................................................................................... 3
Vulnerability Assessments versus Penetration Test.................................................... 3
Preengagement.......................................................................................................... 3
Rules of Engagement................................................................................................ 4
Milestones ................................................................................................................ 4
Penetration Testing Methodologies........................................................................... 5
OSSTMM................................................................................................................ 5
NIST........................................................................................................................ 6
OWASP.................................................................................................................... 7
Categories of Penetration Test............................................................................................ 7
Black Box.................................................................................................................. 7
White Box ................................................................................................................ 7
Gray Box .................................................................................................................. 7
Types of Penetration Tests ........................................................................................ 7
Network Penetration Test................................................................................ 8
Web Application Penetration Test ................................................................... 8
Mobile Application Penetration Test ............................................................... 8
Social Engineering Penetration Test ................................................................ 8
Physical Penetration Test................................................................................. 8
Report Writing ......................................................................................................... 8
Understanding the Audience.................................................................................... 9
vi ◾ Contents
Executive Class................................................................................................ 9
Management Class .......................................................................................... 9
Technical Class................................................................................................ 9
Writing Reports................................................................................................................10
Structure of a Penetration Testing Report.........................................................................10
Cover Page...............................................................................................................10
Table of Contents ....................................................................................................10
Executive Summary.................................................................................................11
Remediation Report ............................................................................................... 12
Vulnerability Assessment Summary................................................................................. 12
Tabular Summary....................................................................................................13
Risk Assessment................................................................................................................14
Risk Assessment Matrix...........................................................................................14
Methodology ....................................................................................................................14
Detailed Findings....................................................................................................15
Description.....................................................................................................15
Explanation ....................................................................................................16
Risk ................................................................................................................16
Recommendation ...........................................................................................16
Reports....................................................................................................................17
Conclusion........................................................................................................................17
2 Linux Basics ...............................................................................................................19
Major Linux Operating Systems .......................................................................................19
File Structure inside of Linux........................................................................................... 20
File Permission in Linux ......................................................................................... 22
Group Permission.......................................................................................... 22
Linux Advance/Special Permission ................................................................ 22
Link Permission............................................................................................. 23
Suid & Guid Permission................................................................................ 23
Stickybit Permission ...................................................................................... 23
Chatter Permission ........................................................................................ 24
Most Common and Important Commands............................................................ 24
Linux Scheduler (Cron Job) ..............................................................................................25
Cron Permission ..................................................................................................... 26
Cron Permission ............................................................................................ 26
Cron Files...................................................................................................... 26
Users inside of Linux ....................................................................................................... 28
Linux Services......................................................................................................... 29
Linux Password Storage.......................................................................................... 29
Linux Logging ........................................................................................................ 30
Common Applications of Linux ...................................................................................... 30
What Is BackTrack?......................................................................................................... 30
How to Get BackTrack 5 Running..........................................................................31
Installing BackTrack on Virtual Box .......................................................................31
Installing BackTrack on a Portable USB..................................................................35