Methods for Running BackTrack Linux
Chapter 1 Ethical Hacking Overview
Introduction to Ethical Hacking
The Role of Security and Penetration Testers
Penetration-Testing Methodologies
Certification Programs for Network Security Personnel
Chapter 2 TCP/IP Concepts Review
Planning IP Address Assignments
Reviewing the Binary Numbering System
Reviewing the Octal Numbering System
Reviewing the Hexadecimal Numbering System
Chapter 3 Network and Computer Attacks
Protecting Against Malware Attacks
Intruder Attacks on Networks and Computers
Distributed Denial-of-Service Attacks
Chapter 4 Footprinting and Social Engineering
Using Web Tools for Footprinting
Conducting Competitive Intelligence
Analyzing a Company’s Web Site
Using Other Footprinting Tools
Other Methods of Gathering Information
Using Domain Name System Zone Transfers
Introduction to Social Engineering
Enumerating Windows Operating Systems
Enumerating the NetWare Operating System
Enumerating the *nix Operating System
Chapter 7 Programming for Security Professionals
Introduction to Computer Programming
Understanding the Basics of Perl
Understanding Object-Oriented Programming Concepts
Components of Object-Oriented Programming
Chapter 8 Desktop and Server OS Vulnerabilities
Tools for Identifying Vulnerabilities in Windows
Best Practices for Hardening Windows Systems
Enable Logging and Review Logs Regularly
Disable Unused Services and Filtering Ports
Tools for Identifying Linux Vulnerabilities
More Countermeasures Against Linux Attacks
Chapter 9 Embedded Operating Systems: The Hidden Threat
Introduction to Embedded Operating Systems
Windows and Other Embedded Operating Systems
Other Proprietary Embedded OSs
Vulnerabilities of Embedded OSs
Embedded OSs Are Difficult to Patch
Embedded OSs Are in Networking Devices
Embedded OSs Are in Network Peripherals
Supervisory Control and Data Acquisition Systems
Cell Phones, Smartphones, and PDAs
Best Practices for Protecting Embedded OSs
Chapter 10 Hacking Web Servers
Understanding Web Applications
Understanding Web Application Vulnerabilities
Application Vulnerabilities and Countermeasures
Tools for Web Attackers and Security Testers
Chapter 11 Hacking Wireless Networks
Understanding Wireless Technology
Components of a Wireless Network
Understanding Wireless Network Standards
An Overview of Wireless Technologies
Additional IEEE 802.11 Projects
Understanding Wireless Hacking
Countermeasures for Wireless Attacks
Understanding Cryptography Basics
Understanding Symmetric and Asymmetric Algorithms
Understanding Public Key Infrastructure
Understanding Cryptography Attacks
Understanding Password Cracking
Chapter 13 Network Protection Systems
Understanding Routing Protocols
Understanding Basic Hardware Routers
Understanding Access Control Lists
Understanding Firewall Technology
Understanding the Cisco Adaptive Security Appliance Firewall
Using Configuration and Risk Analysis Tools for Firewalls and Routers
Understanding Intrusion Detection and Prevention Systems
Network-Based and Host-Based IDSs and IPSs
Security Incident Response Teams
Appendix C Virtualization and Ethical Hacking
Virtualization and Security Testing
Virtualization Vulnerabilities
Installing and Using Virtualization Software
Downloading and Installing VMware Server
Creating a Virtual Machine and Installing a Guest OS