Monthly Archives: October 2011

BackTrack 5 Guide II: Exploitation tools and frameworks

Hi all,

In the first part of this BackTrack 5 guide, we looked at information gathering and vulnerability assessment tools. In the second part of this BackTrack 5 guide, we will use BackTrack 5 tools to exploit a remote system and learn how the exploitation framework can be used with the privilege escalation tool John the Ripper to crack passwords and gain access to a remote Windows system.

Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:

http://searchsecurity.techtarget.in/tip/BackTrack-5-Guide-II-Exploitation-tools-and-frameworks

Keep looking this blog for more on BT5.

Cheers

3ps!L0nLaMbDa

BackTrack 5 tutorial Part I: Information gathering and VA tools

Greetings!

In this BackTrack 5 penetration testing tutorial, we will look at the information gathering and vulnerability assessment tools in BackTrack 5.

Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:

http://searchsecurity.techtarget.in/tip/BackTrack-5-tutorial-Part-I-Information-gathering-and-VA-tools

Cheers
3ps!L0nLaMbDa

Advanced Wireshark tutorial: Packet and network security analysis

Hi all,

A follow up to my previous guide (Quick and dirty Wireshark tutorial), this advanced Wireshark tutorial will help you delve into Wireshark’s more advanced features. While the first section of this Wireshark tutorial explains how to analyze packets and get the time on a router whose IP address series is known, the second section deals with security analysis using Wireshark.

Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:

http://searchsecurity.techtarget.in/tip/Advanced-Wireshark-tutorial-Packet-and-network-security-analysis

Cheers

3ps!l0nLaMbDa

 

BackTrack-5 series to be posted soon @ 3psil0nlambda

Hi all,

BackTrack-5 series to be posted soon @ 3psil0nlambda in association with http://searchsecurity.techtarget.in. The project Revolution, the most awaited pen-testing framework has released on May 10th 2011, with a lot of promises. Famously knows as the back-track flavor of linux, this is a major development over the back-track4 R2. This new version supposedly, is built from scratch and has seen major improvements and bug fixes in the Back Track series of OS.

(Image courtesy, official backtrack website)

As we all know any penetration tester would ideally phase his attack in to five phases, namely:

  1. Information gathering
  2. Scanning and Vulnerability assesment
  3. Gaining access to the target
  4. Maintaining access with the target
  5. Clearing tracks

We shall see how back track 5 facilitates this approach in the pen testing scenario, in the BT5 series. The posts will be published on searchsecurity.techtarget.in and I shall update my posting here.

Until then cheers 😉

3psil0nlambda