Beruflich Dokumente
Kultur Dokumente
TOOLKITS:
BACKBOX & KALI LINUX
JELMER DE REUS
Overview
Enumeration
Open
ports
Firewall/IDS testing
Topology mapping
Software version indexing
Vulnerability scan
Penetration testing
Social Engineering
Forensics
Enumeration
Vulnerability scan
Finding
Penetration testing
Social Engineering
Forensics
Enumeration
Vulnerability scan
Penetration testing
Creatively,
Social Engineering
Forensics
Enumeration
Vulnerability scan
Penetration testing (incl. WIFI cracking)
Social Engineering
E.g.
Social Engineer
Toolkit
Web
attack
Enumeration
Vulnerability scan
Penetration testing
Social Engineering
WIFI cracking
Cracking
wireless keys
Redirecting/tapping WIFI users
Social engineering (e.g. redirect to a fake website, collect pw)
Exploiting browsers
Network troubleshooting
Firewall
Non-root user
Smaller selection of
tools
Sorted
by technology
Root user
Extensive collection
of tools
Sorted
by activity
Arduino IDE
Forum
Technical
questions
Tooling requests
Howtos
Blog articles
Extensive documentation
Securitytube
Youtube
BackBox Linux
Kali Linux
Tooling
What is it really about when choosing either?
Installed and available tools (very personal)
Keeping track of various types of updates, e.g.
Metasploit
Framework
OpenVAS signatures
Tooling - advice
Penetration Testing Execution Standard
PTES Technical Guidelines
Structured
Kali Linux
Main:
http://www.kali.org
Official Docs: http://www.kali.org/official-documentation /
BackBox Linux
Main:
http://www.backbox.org
Forum/Howto: http://forum.backbox.org /
Metasploit Unleashed
http://www.offensive-security.com/metasploit-unleashed/Main_Page