Backtrack Penetration Testing: Introduction - AndroGeek88


Download Latest Android premium Apps . This is the Best premium APK site. Technology related articles , cyber security technique etc


Backtrack Penetration Testing: Introduction

Backtrack Penetration Testing: Introduction

  • What is Penetration Testing?

Penetration testing is that the legal and authorized plan to exploit a computing system with the intent
of creating a network or system safer. The process includes scanning systems trying to find weak
spots, and launching attacks and prove that the system is susceptible to attack from a genuine hacker.

  • Penetration Testing has several names:

1.Pen Testing.

2.Ethical Hacking.

3.White Hat Hacking.

As you learn more about the art of hacking, you'll see three terms used tons. The white hats, the black hats, and therefore the gray hats. The white hats are the "good guys". They hack systems and networks so that the black hats ("bad guys") can't. The black hats also referred to as "crackers" are
people who use hacking with malicious intent. They're those that want to steal company secrets or your MasterCard information. For this reason, the white hats need to know the tools and tricks of the black hats to stay a step ahead of them. As for the grey hats, they're a mixture of white and black. They often hack because they will or just like the challenge.

By now you'll want to download and install backtrack Linux on your computer. You can find out how to try to that at Installing Backtrack.

If you have been following the security world, you may have heard of Kali Linux, also known as the newest Backtrack. Any lessons here are often utilized in both Backtrack 5 and Kali. I will be writing a piece of writing about any differences between the two sometime soon.

Recommended Reading: the fundamentals of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

A great book for anyone just learning how to hack or wants to know more about security. Covers tons of what you'll find here plus tons more. I can't recommend this enough for beginners. Hacking Lab- Having an area to practice is essential to find out the way to hack. This is where your home hacking lab comes in. It is an area where you'll control your attacks without harming the other systems. We want our lab to be isolated and have no chance of escaping to targets we didn't mean to attack.

Option 1:

  • Two computes
  • Ethernet Cable
  • A switch

Option 2:

Use Virtual Machines You will need three or more virtual machines. One for Backtrack, one for a windows machine, and one for an additional Linux box. The Linux box will act as out victim server: SSH, Web server, FTP, etc.

Option 1 is just in case you've got older hardware that can't handle running quite one VM. However, these days, modern equipment can handle them. Option 2 is the more sensible choice because you need one computer.

Steps in Penetration Testing

  • Reconnaissance
  • Scanning
  • Exploitation
  • Maintaining Access

No comments:

Post a Comment

Hey Geek Welcome to Androgeek