Penetration Testing: Protecting Networks and Systems
Kevin M. Henry
Format: PDF / Kindle (mobi) / ePub
Penetration Testing: Protecting Networks and Systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report.
The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting.
their name says: they capture keystrokes. A keystroke logger will record everything a person types – including user IDs, passwords, banking data and e-mails – and provide it to the person that installed the keystroke logger. Keystroke loggers can be either hardware or software. Many hardware-based devices will plug into a serial or USB port, or be placed in the middle of the connection between the keyboard and the desktop. They will gather and store information until retrieved and read by the
set the log files to be written to a write-once / read-many device, so that it is not possible for logs entries to be erased. An attacker will also want to ensure that no evidence of the attack that would be discoverable in a forensics investigation is left on their host machine either To do this, they will shred any files or data that has been saved on their machine, including data or files stored in cache or temporary files. In launching the attack, an attacker can hide their location through
programming languages are more vulnerable to invalid input than others, especially those that will do formatting of data automatically. The C programming language is a good example of this. Several functions, such as “printf”, will execute without validating input and may, therefore, be manipulated by an attacker to overwrite other memory areas or corrupt system operations. Buffer overflows Buffer overflow attacks have been one of the most common problems found in systems programming over the
not being modified in some way as they are transmitted wirelessly, and TKIP improves the key generation process. The next step in wireless encryption was the introduction of WPA2.® WPA2 uses the Advanced Encryption Standard (AES) algorithm in Counter mode, and uses CBC-MAC for integrity. This is commonly referred to as CCMP. WPA2 is a secure method of implementing wireless encryption and should be the standard for all organizations. Pen testing wireless Wireless devices pose a great risk to an
attacker may also manipulate the cookie using tools like CookieSpy. Questions 1. Attacks against e-commerce sites are usually achieved by stealing data in: a) Storage and processing b) Transport and input fields c) Output or reports d) Storage and transport. Answer: D 155 8: Attacking Web Applications 2. One of the greatest challenges to the investigation of computer crime is: a) Lack of good forensics tools b) Obtaining evidence and gaining co-operation from international sources c) Decrease