

Information and an organizational profile of the target through conclusive footprinting, we will assess the weak spots or vulnerabilities in the system. Burp Suite training tutorial: Part 3 – Sequencer, decoder and composer.Burp Suite Tutorial: Part 2 – Intruder and repeater tools.

The second phase in pen testing is vulnerability assessment. Views such as mining view, edge weighted view, etc, provide a graphical representation of the data obtained about a particular target. Maltego uses various transformations on these entities to give the pen tester necessary details about the target. The Palette in Maltego shows the DNS name, domain, location, URL, email, and other details about the website. Figure 4 of this BackTrack 5 tutorial shows Maltego in action. The joomscan tool (for the Joomla CMS) is covered later in this BackTrack 5 tutorial.Īnother interesting and powerful tool is Maltego, generally used for SMTP analysis. CMS identification gives information about the underlying CMS, which can be used to do a vulnerability research on the CMS and gather all the available exploits to test the target system. Other BackTrack 5 information gathering tools of interest are CMS identification and IDS-IPS identification for web application analysis. This information is especially useful for white box testing.

The intense scan mode in Zenmap provides target information such as services running on each port, the version, the target operating system, network hop distance, workgroups and user accounts.

Figure 3 of this BackTrack tutorial is a screen shot of Zenmap, the BackTrack information gathering and network analysis tool. This creates an organizational profile of the target, along with the systems and networks in use. In this phase, the attacker gains information about aspects such as the target network, open ports, live hosts and services running on each port. Information gathering is the first and most important phase in penetration testing. In this BackTrack 5 penetration testing tutorial, we will look at the information gathering and vulnerability assessment tools in BackTrack 5. Penetration testers usually perform their test attacks in five phases: BackTrack has 12 categories of tools, as shown in Figure 1 of this tutorial.įigure 1: Categories of tools in BackTrack 5 BackTrack 5 tools range from password crackers to full-fledged penetration testing tools and port scanners. BackTrack is named after a search algorithm called “backtracking”.
