The Hacker Playbook: Practical Guide To Penetration Testing

The Hacker Playbook: Practical Guide To Penetration Testing

Peter Kim

Language: English

Pages: 294

ISBN: 1494932636

Format: PDF / Kindle (mobi) / ePub

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Computing Meaning, Volume 4 (Text, Speech and Language Technology, Volume 47)

Beyond Artificial Intelligence: The Disappearing Human-Machine Divide (Topics in Intelligent Engineering and Informatics, Volume 9)

Java for Everyone: Late Objects (2nd Edition)

Communicating Data with Tableau

Absolute C++ (5th Edition)

Mercurial: The Definitive Guide














modify the parameters to inject into. In this example, we will inject into both the username and password: gedit ~/Desktop/sql_post.conf Enter the following into the configuration file and save it: —httprequest_start— POST HTTP/1.0 Host: User-Agent: Mozilla/5.0 (X11; U; en-US; rv:1.7.13) Gecko/20060418 Firefox/1.0.8 Accept: text/xml, application/xml, text/html; q=0.9, text/plain; q=0.8, image/png, */* Accept-Language: en-us, en; q=0.7, it;q=0.3

injected attacks. We do have a couple of problems with these hashes though. We can’t really use these hashes right away in any sort of pass-the-hash type, as these are the NTLM challenge/response hashes. What we can then do with these hashes is utilize John the Ripper or oclHashcat. John Example: $ cat hashes.txt cheetz::FAKEDOMAIN:1122334455667788:4D8AABB385ADC35D8ABF778E9852BC27:01010000 $ john —format=netntlmv2 hashes.txt Loaded 1 password hash (NTLMv2 C/R MD4 HMAC-MD5 [32/32]) password

wireless adaptor supports 802.11 a/b/g/n and works natively with Backtrack and Kali. This card also uses the RaLink chip set, which I am a big fan of. The reason that I use a USB wireless card is that my Kali system is generally a VM and because of that, it can’t utilize the native built-in wireless card. Figure 114 - Alfa AWUS051NH The Alfa AWUS051NH:

at the same time and this is enough havoc to easily sneak in. If you are interested in card cloning, some hardware tools I’d look more into are: ProxMark3 -RFID Cloning ProxBrute - BruteForcing RFIDiot - RFID Cloning and Scripts Separately, these guys at Bishop Fox have created a physical tool called Tastic RFID that uses long range RFID card cloning. You can read more about this on their site, which discusses exactly how to build one of these for yourself. Their site is located:

assists in penetration testing, but didn’t have a place elsewhere. I will discuss some of the tips and tricks I have for cracking password hashes, searching for vulnerabilities, and some short cuts I have. There are so many different tools to use with password cracking that I’m going to focus mainly on two tools that I use. These two tools are John the Ripper (JtR) and oclHashcat. These are both excellent tools for cracking passwords. Before I can start talking about different password crackers,

Download sample


About admin