文档介绍:Table of Contents Preface 1 PART I: Lab Preparation and Testing Procedures Chapter 1: Beginning with BackTrack 9 History 9 BackTrack purpose 9 Getting BackTrack 11 Using BackTrack 12 Live DVD 12 Installing to hard disk 13 Installation in real machine 13 Installation in VirtualBox 14 Portable BackTrack 19 work connection 21 setup 21 Wireless setup 22 Starting work service 24 Updating BackTrack 24 Updating software applications 25 Updating the kernel 26 Installing additional weapons 29 Nessus vulnerability scanner 30 WebSecurify 31 Customizing BackTrack 32 Summary 34 Chapter 2: ration Testing Methodology 37 Types of ration testing 38 Black-box testing 38 White-box testing 39 Vulnerability assessment versus ration testing 39 Table of Contents Security testing methodologies 41 Open Source Security Testing Methodology Manual (OSSTMM) 42 Key features and benefits 43 Information Systems Security Assessment Framework (ISSAF) 44 Key features and benefits 45 Open Web Application Security Project (OWASP) Top Ten 46 Key features and benefits 48 Web Application Security Consortium Threat Classification (WASC-TC) 49 Key features and benefits 50 BackTrack testing methodology 51 Target scoping 52 Information gathering 52 Target discovery 53 Enumerating target 53 Vulnerability mapping 53 Social engineering 54 Target exploitation 54 Privilege escalation 54 Maintaining access 55 Documentation and reporting 55 The ethics 55 Summary 56 PART II: ration Testers Armory Chapter 3: Target Scoping 61 Gathering client requirements 62 Customer requirements form 63 Deliverables assessment form 64 Preparing the test plan 64 Test plan checklist 66 Profiling test boundaries 67 Defining business objectives 68 Project management and scheduling 69 Summary 70 Chapter 4: Information Gathering 73 Public resources 74 Document gathering 75 Metagoofil 75 DNS information 77 dns