Dataset Preview
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code: DatasetGenerationError
Exception: TypeError
Message: Couldn't cast array of type
list<item: struct<page_number: int64, text: string>>
to
{'page_number': Value(dtype='int64', id=None), 'text': Value(dtype='string', id=None)}
Traceback: Traceback (most recent call last):
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1870, in _prepare_split_single
writer.write_table(table)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 622, in write_table
pa_table = table_cast(pa_table, self._schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2292, in table_cast
return cast_table_to_schema(table, schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2245, in cast_table_to_schema
arrays = [
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2246, in <listcomp>
cast_array_to_feature(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in wrapper
return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in <listcomp>
return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2108, in cast_array_to_feature
raise TypeError(f"Couldn't cast array of type\n{_short_str(array.type)}\nto\n{_short_str(feature)}")
TypeError: Couldn't cast array of type
list<item: struct<page_number: int64, text: string>>
to
{'page_number': Value(dtype='int64', id=None), 'text': Value(dtype='string', id=None)}
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1417, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1049, in convert_to_parquet
builder.download_and_prepare(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 924, in download_and_prepare
self._download_and_prepare(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1000, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1741, in _prepare_split
for job_id, done, content in self._prepare_split_single(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1897, in _prepare_split_single
raise DatasetGenerationError("An error occurred while generating the dataset") from e
datasets.exceptions.DatasetGenerationError: An error occurred while generating the datasetNeed help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
pages dict |
|---|
{
"page_number": 1,
"text": ""
} |
{
"page_number": 2,
"text": "Kali Linux – Assuring Security \nby Penetration Testing\nMaster the art of penetration testing with Kali Linux\nLee Allen\nTedi Heriyanto\nShakeel Ali\n BIRMINGHAM - MUMBAI\n"
} |
{
"page_number": 3,
"text": "[ FM-2 ]\nKali Linux – Assuring Security by Penetration Testing\nCopyright © 2014 Packt Publishing\nAll rights reserved. No part of this book may be reproduced, stored in a retrieval \nsystem, or transmitted in any form or by any means, without the prior written \npermission of the publ... |
{
"page_number": 4,
"text": "[ FM-3 ]\nCredits\nAuthors\nLee Allen\nTedi Heriyanto\nShakeel Ali\nReviewers\nAlex Gkiouros\nNeil Jones\nAcquisition Editors\nHarsha Bharwani\nUsha Iyer\nRubal Kaur\nContent Development Editor\nSweny M. Sukumaran\nTechnical Editors\nMrunal Chavan\nPankaj Kadam\nGaurav Thingalaya\nCopy ... |
{
"page_number": 5,
"text": "[ FM-4 ]\nAbout the Authors\nLee Allen is currently working as a security architect at a prominent university. \nThroughout the years, he has continued his attempts to remain up to date with \nthe latest and greatest developments in the security industry and the security \ncommunity. He... |
{
"page_number": 6,
"text": "[ FM-5 ]\nTedi Heriyanto currently works as a principal consultant in an Indonesian \ninformation security company. In his current role, he has been engaged with various \npenetration testing assignments in Indonesia and other countries. In his previous \nrole, he was engaged with sever... |
{
"page_number": 7,
"text": "[ FM-6 ]\nShakeel Ali is a Security and Risk Management consultant at Fortune 500. \nPreviously, he was the key founder of Cipher Storm Ltd., UK. His expertise in the \nsecurity industry markedly exceeds the standard number of security assessments, \naudits, compliance, governance, and ... |
{
"page_number": 8,
"text": "[ FM-7 ]\nAbout the Reviewers\nAlex Gkiouros is currently an independent IT professional who's been assigned \nvarious projects around Greece and has been working in the IT industry since 2006. \nHe holds two entry-level ISACA certifications, and he's studying for his CCNP. He \nis so p... |
{
"page_number": 9,
"text": "[ FM-8 ]\nwww.PacktPub.com\nSupport files, eBooks, discount offers and more\nYou might want to visit www.PacktPub.com for support files and downloads related \nto your book. \nDid you know that Packt offers eBook versions of every book published, with PDF \nand ePub files available? You... |
{
"page_number": 10,
"text": "[ FM-9 ]\nDisclaimer\nThe content within this book is for educational purposes only. It is designed to help \nusers test their own system against information security threats and protect their IT \ninfrastructure from similar attacks. Packt Publishing and the authors of this book \ntak... |
{
"page_number": 11,
"text": ""
} |
{
"page_number": 12,
"text": "[ FM-11 ]\nI would like to dedicate this book to my loving family for their kind support \nthroughout the years, especially to my niece, Jennifer, and nephews, Adan and \nJason, whose smiles are an inspiration and encouragement in my life; to my \nbrilliant teachers, the ones who turne... |
{
"page_number": 13,
"text": ""
} |
{
"page_number": 14,
"text": "Table of Contents\nPreface\t\n1\nPART I: Lab Preparation and Testing Procedures\nChapter 1: Beginning with Kali Linux\t\n9\nA brief history of Kali Linux\t\n9\nKali Linux tool categories\t\n10\nDownloading Kali Linux\t\n12\nUsing Kali Linux\t\n14\nRunning Kali using Live DVD\t\n14\nIns... |
{
"page_number": 15,
"text": "Table of Contents\n[ ii ]\nInstalling additional weapons\t\n45\nInstalling the Nessus vulnerability scanner\t\n47\nInstalling the Cisco password cracker\t\n49\nSummary\t\n49\nChapter 2: Penetration Testing Methodology\t\n51\nTypes of penetration testing\t\n52\nBlack box testing\t\n52\n... |
{
"page_number": 16,
"text": "Table of Contents\n[ iii ]\nProfiling test boundaries\t\n79\nDefining business objectives\t\n80\nProject management and scheduling\t\n81\nSummary\t\n82\nChapter 4: Information Gathering\t\n85\nUsing public resources\t\n86\nQuerying the domain registration information\t\n87\nAnalyzing t... |
{
"page_number": 17,
"text": "Table of Contents\n[ iv ]\nChapter 6: Enumerating Target\t\n143\nIntroducing port scanning\t\n143\nUnderstanding the TCP/IP protocol\t\n144\nUnderstanding the TCP and UDP message format\t\n146\nThe network scanner\t\n149\nNmap\t\n150\nNmap target specification\t\n153\nNmap TCP scan opt... |
{
"page_number": 18,
"text": "Table of Contents\n[ v ]\nSNMP analysis\t\n207\nSNMP Walk\t\n208\nWeb application analysis\t\n210\nDatabase assessment tools\t\n211\nDBPwAudit\t\n211\nSQLMap\t\n213\nSQL Ninja\t\n217\nWeb application assessment \t\n220\nBurp Suite\t\n220\nNikto2\t\n223\nParos proxy\t\n225\nW3AF\t\n226\... |
{
"page_number": 19,
"text": "Table of Contents\n[ vi ]\nChapter 10: Privilege Escalation\t\n283\nPrivilege escalation using a local exploit\t\n284\nPassword attack tools\t\n287\nOffline attack tools\t\n289\nhash-identifier\t\n289\nHashcat\t\n290\nRainbowCrack\t\n293\nsamdump2\t\n298\nJohn\t\n299\nJohnny\t\n303\nOp... |
{
"page_number": 20,
"text": "Table of Contents\n[ vii ]\nTransferring files\t\n349\nsslh\t\n350\nstunnel4\t\n352\nCreating web backdoors\t\n356\nWeBaCoo\t\n356\nweevely\t\n359\nPHP Meterpreter\t\n362\nSummary\t\n364\nChapter 12: Documentation and Reporting\t\n365\nDocumentation and results verification\t\n366\nTyp... |
{
"page_number": 21,
"text": "Table of Contents\n[ viii ]\nAppendix B: Key Resources\t\n401\nVulnerability disclosure and tracking\t\n401\nPaid incentive programs\t\n404\nReverse engineering resources\t\n404\nPenetration testing learning resources\t\n405\nExploit development learning resources\t\n407\nPenetration t... |
{
"page_number": 22,
"text": "Preface\nKali Linux is a penetration testing and security auditing platform with advanced \ntools to identify, detect, and exploit any vulnerabilities uncovered in the target \nnetwork environment. Applying an appropriate testing methodology equipped with \nwell-defined business object... |
{
"page_number": 23,
"text": "Preface\n[ 2 ]\nWhat this book covers\nChapter 1, Beginning with Kali Linux, introduces you to Kali Linux, a Live DVD Linux \ndistribution specially developed to help in the penetration testing process. You will \nlearn a brief history of Kali Linux and several categories of tools that... |
{
"page_number": 24,
"text": "Preface\n[ 3 ]\nChapter 6, Enumerating Target, introduces you to target enumeration and its purpose. \nYou will learn a brief theory on port scanning and several tools that can be used to \ndo port scanning. You will also learn about various options available to be used by \nthe Nmap p... |
{
"page_number": 25,
"text": "Preface\n[ 4 ]\nChapter 12, Documentation and Reporting, covers the penetration testing directives \nfor documentation, report preparation, and presentation. These directives draw a \nsystematic, structured, and consistent way to develop the test report. Furthermore, \nyou will learn a... |
{
"page_number": 26,
"text": "Preface\n[ 5 ]\nWhen we wish to draw your attention to a particular part of a code block, the \nrelevant lines or items are set in bold:\n# SET TO ON IF YOU WANT TO USE EMAIL IN CONJUNCTION WITH WEB ATTACK\nWEBATTACK_EMAIL=ON\nAny command-line input or output is written as follows:\n# ... |
{
"page_number": 27,
"text": "Preface\n[ 6 ]\nErrata\nAlthough we have taken every care to ensure the accuracy of our content, mistakes \ndo happen. If you find a mistake in one of our books—maybe a mistake in the text or \nthe code—we would be grateful if you would report this to us. By doing so, you can \nsave ot... |
{
"page_number": 28,
"text": "PART I\nLab Preparation \nand Testing \nProcedures\nBeginning with Kali Linux\nPenetration Testing Methodology \n"
} |
{
"page_number": 29,
"text": ""
} |
{
"page_number": 30,
"text": "Beginning with Kali Linux\nThis chapter will guide you through the wonderful world of Kali Linux—a \nspecialized Linux distribution for the purpose of penetration testing. In this chapter, \nwe will cover the following topics:\n•\t\nA brief history of Kali\n•\t\nSeveral common usages o... |
{
"page_number": 31,
"text": "Beginning with Kali Linux\n[ 10 ]\nThe following are the major features of Kali Linux (http://docs.kali.org/\nintroduction/what-is-kali-linux):\n•\t\nIt is based on the Debian Linux distribution\n•\t\nIt has more than 300 penetration testing applications\n•\t\nIt has vast wireless card... |
{
"page_number": 32,
"text": "Chapter 1\n[ 11 ]\n•\t\nMaintaining access: Tools in this category will be able to help you maintain \naccess to the target machine. You might need to get the highest privilege \nlevel in the machine before you can install tools in this category. Here, you \ncan find tools for backdoor... |
{
"page_number": 33,
"text": "Beginning with Kali Linux\n[ 12 ]\nDownloading Kali Linux\nThe first thing to do before installing and using Kali Linux is to download it. You can \nget Kali Linux from the Kali Linux website (http://www.kali.org/downloads/).\nOn the download page, you can select the official Kali Linu... |
{
"page_number": 34,
"text": "Chapter 1\n[ 13 ]\nIn the UNIX/Linux/BSD operating system, you can use the sha1sum command to \ncheck the SHA1 hash value of the downloaded image file. Remember that it might \ntake some time to compute the hash value of the Kali Linux image file due to its size. \nFor example, to gene... |
{
"page_number": 35,
"text": "Beginning with Kali Linux\n[ 14 ]\nYou need to compare the SHA1 hash value generated by sha1sum, HashMyFiles \nor other similar tools with the SHA1 hash value displayed on the Kali Linux \ndownload page.\nIf both the values match, you can go straight to the Using Kali Linux section. B... |
{
"page_number": 36,
"text": "Chapter 1\n[ 15 ]\nInstalling on a hard disk\nTo install Kali Linux on your hard disk, you can choose one of the following methods:\n•\t\nInstallation on a physical/real machine (regular installation)\n•\t\nInstallation on a virtual machine\nYou can choose whichever method is suitable ... |
{
"page_number": 37,
"text": "Beginning with Kali Linux\n[ 16 ]\nAfter you are done with the disk partitioning or you just want to use all the hard \ndisk space, you can boot your machine using the Kali Linux Live DVD and select \nthe Install or Graphical install option when you are prompted with the Kali Linux \n... |
{
"page_number": 38,
"text": "Chapter 1\n[ 17 ]\n8.\t In the disk partitioning segment, the installer will guide you through the disk \npartitioning process. If you use an empty hard disk, just select the default \nGuided - use entire disk option for better ease. If you have some other \noperating system installed ... |
{
"page_number": 39,
"text": "Beginning with Kali Linux\n[ 18 ]\n13.\t If you see the following message, it means that your Kali installation \nis complete:\n14.\t You can restart the machine to test your new Kali installation by \nselecting the Continue button. After restarting, you will see the \nfollowing Kal... |
{
"page_number": 40,
"text": "Chapter 1\n[ 19 ]\nInstalling Kali on a virtual machine\nYou can also install Kali Linux to a virtual machine environment as a guest operating \nsystem. The advantages of this type of installation are that you do not need to \nprepare a separate physical hard disk partition for the Kal... |
{
"page_number": 41,
"text": "Beginning with Kali Linux\n[ 20 ]\n3.\t Then, you need to define the VM's base memory size. The more memory you \nprovide, the better the virtual machine will be. Here, we allocated 2048 MB \nof memory to the Kali Linux virtual machine. Remember that you can't give \nall of your physic... |
{
"page_number": 42,
"text": "Chapter 1\n[ 21 ]\n5.\t After this, your newly created VM will be listed on the VirtualBox menu. \n6.\t To use the Kali Linux ISO image, select the VM from the VirtualBox menu \nand then click on the Storage menu to configure it:\n7.\t From Storage Tree, select IDE Controller and in th... |
{
"page_number": 43,
"text": "Beginning with Kali Linux\n[ 22 ]\nInstalling Kali in a virtual machine using the provided Kali \nVM image\nThe second option is using the VMWare image provided by Kali Linux. \nThe Kali Linux team only provides Kali Linux GNOME \nVMware image for an i386 machine.\nWith this option, yo... |
{
"page_number": 44,
"text": "Chapter 1\n[ 23 ]\n3.\t Next, we define the virtual hard disk to Use an existing virtual hard drive \nfile. Then, we select the kali-linux-i386-gnome-vm.vmdk file for the hard \ndisk. After that, we choose Create to create the virtual machine, as shown in \nthe following screenshot:\nT... |
{
"page_number": 45,
"text": "Beginning with Kali Linux\n[ 24 ]\nIf successful, you will see the new virtual machine in the virtual manager list:\nTo run the Kali Linux virtual machine, click on the Start icon at the top of the \nVirtualBox menu bar. After the boot process, Kali Linux will display its login prompt.... |
{
"page_number": 46,
"text": "Chapter 1\n[ 25 ]\nTo install the extension pack from the VirtualBox Manager, perform the \nfollowing steps:\n1.\t Navigate to File | Preferences; it will then display the Settings window. \nNext, select the Extensions menu:\n2.\t Click on the Add package button to select the VirtualB... |
{
"page_number": 47,
"text": "Beginning with Kali Linux\n[ 26 ]\n3.\t Select Install to install the extension pack and follow the given instructions. \nIf the installation is successful, you will see the extension pack in the list:\n4.\t You can then log in to Kali Linux using the default username and password.\nIn... |
{
"page_number": 48,
"text": "Chapter 1\n[ 27 ]\n•\t\nUSB flash disk: You need an empty USB flash disk with enough space on it. \nWe suggest using a USB flash disk with a minimum size of 16 GB.\nAfter downloading Rufus, you can run it on your Windows computer by double-\nclicking on the rufus.exe file. You will the... |
{
"page_number": 49,
"text": "Beginning with Kali Linux\n[ 28 ]\nClick on Start to create the bootable image:\nAfter the process is complete, save all your work first and then reboot your system \nif you want to try the USB flash disk right away. You may want to configure your \nBasic Input Output System (BIOS) to ... |
{
"page_number": 50,
"text": "Chapter 1\n[ 29 ]\nTo install the guest additions, you can perform the following steps:\n1.\t From the VirtualBox menu, navigate to Devices | Install Guest Additions. \nYou will then see that the VirtualBox guest addition file is mounted as \na disk:\n2.\t Then, VirtualBox will displa... |
{
"page_number": 51,
"text": "Beginning with Kali Linux\n[ 30 ]\n4.\t Execute VBoxLinuxAdditions.run to run the VirtualBox guest \nadditions installer:\nsh ./VBoxLinuxAdditions.run\n5.\t You may need to wait for several minutes until all of the required modules \nare successfully built and installed:\n6.\t Change ... |
{
"page_number": 52,
"text": "Chapter 1\n[ 31 ]\nSetting up a wired connection\nIn the default Kali Linux VMware image or ISO configuration, Kali Linux uses NAT \n(Network Address Translation) as the network's connection type. In this connection \nmode, the Kali Linux machine will be able to connect to the outside ... |
{
"page_number": 53,
"text": "Beginning with Kali Linux\n[ 32 ]\nIn the default configuration, all of the network cards are set to use DHCP to get the \nIP address. To make a network card bind to an IP address permanently, we have to \nedit that file and change the content to the following:\nauto eth0\niface eth0 i... |
{
"page_number": 54,
"text": "Chapter 1\n[ 33 ]\nYou will see several networks' names, wired or wireless, available for your machine:\nTo connect to the wireless network, just select the particular SSID you want by \ndouble-clicking on its name. If the wireless network requires authentication, you will \nbe prompte... |
{
"page_number": 55,
"text": "Beginning with Kali Linux\n[ 34 ]\nYou can test whether your network is working correctly by sending an ARP ping \nrequest to a host in the same network segment using the arping command. \nYou may find that after you reboot your Kali Linux machine, the networking service \nneeds to be ... |
{
"page_number": 56,
"text": "Chapter 1\n[ 35 ]\nTo add the folder from the host OS, click on the + icon on the right-hand side. After \nthat, select the appropriate folder that you want to share in the host OS. The selected \nfolder path will be displayed in the Folder Path field.\nFor the Folder Name field, you c... |
{
"page_number": 57,
"text": "Beginning with Kali Linux\n[ 36 ]\nTo save the virtual machine's state, VirtualBox has provided you with this capability \nunder the menu of Machine – Take Snapshot. You need to start the virtual machine \nbefore you can take its snapshot:\nFor the Snapshot Name, you can use any name b... |
{
"page_number": 58,
"text": "Chapter 1\n[ 37 ]\n4.\t Next, you are prompted for the appliance export's configuration values. You \ncan configure the properties here. However, you can usually just leave them \nempty unless you need to set specific values:\nAfter this, the exporting process will take place. The time... |
{
"page_number": 59,
"text": "Beginning with Kali Linux\n[ 38 ]\nThe default sources.list file included in Kali Linux contains the following entries:\n# deb cdrom:[Debian GNU/Linux 7.0 _Kali_ - Official Snapshot i386 \nLIVE/INSTALL Binary 20130315-11:39]/ kali contrib main non-free\n#deb cdrom:[Debian GNU/Linux 7.0... |
{
"page_number": 60,
"text": "Chapter 1\n[ 39 ]\nNetwork services in Kali Linux\nThere are several network services available in Kali Linux; in this section, we will \ndescribe only some of them: the HTTP, MySQL, and SSH service. You can find the \nother services by navigating to Kali Linux | System Services.\nHTTP... |
{
"page_number": 61,
"text": "Beginning with Kali Linux\n[ 40 ]\n2.\t If there are no errors, the system will reply with the following message:\n[....] Stopping web server: apache2 [ ok waiting .\n3.\t Remember that the previous command will not survive the boot up. After the \nboot up, you need to give the command... |
{
"page_number": 62,
"text": "Chapter 1\n[ 41 ]\nCopyright (c) 2000, 2013, Oracle and/or its affiliates. All rights \nreserved.\nOracle is a registered trademark of Oracle Corporation and/or its\naffiliates. Other names may be trademarks of their respective\nowners.\nType ''help;'' or ''\\h'' for help. Type ''\\c''... |
{
"page_number": 63,
"text": "Beginning with Kali Linux\n[ 42 ]\nSSH\nFor the next service, we will look into the Secure Shell (SSH). SSH can be used to \nlog in to a remote machine securely; apart from that, there are several other usages of \nSSH, such as securely transferring a file between machines, executing a... |
{
"page_number": 64,
"text": "Chapter 1\n[ 43 ]\nInstalling a vulnerable server\nIn this section, we will install a vulnerable virtual machine as a target virtual \nmachine. This target will be used in several chapters of the book when we explain \nparticular topics. The reason we chose to set up a vulnerable serve... |
{
"page_number": 65,
"text": "Beginning with Kali Linux\n[ 44 ]\n3.\t Create a new virtual machine in VirtualBox. Set Name to Metasploitable2, \nOperating System to Linux, and Version to Ubuntu.\n4.\t Set the memory to 1024MB.\n5.\t In the Virtual Hard Disk setting, select Use existing hard disk. Choose the \nMetas... |
{
"page_number": 66,
"text": "Chapter 1\n[ 45 ]\nInstalling additional weapons\nAlthough the latest version of Kali Linux always comes with many security tools, \nsometimes you need to add additional software tools due to the following reasons:\n•\t\nThe latest version of the tool has not been included in Kali Linu... |
{
"page_number": 67,
"text": "Beginning with Kali Linux\n[ 46 ]\nIn this section, we will briefly discuss the apt command in a practical way that is \nrelated to the software package installation process.\nTo search for a package name in the repository, you can use the following command:\napt-cache search <package_... |
{
"page_number": 68,
"text": "Chapter 1\n[ 47 ]\nIn this section, we will provide you with examples on how to install several \nadditional security tools that are not available from the Kali Linux repository. We \nwill give various mechanisms that can be used to install the software:\n•\t\nDownloading the Debian pa... |
{
"page_number": 69,
"text": "Beginning with Kali Linux\n[ 48 ]\n2.\t Open your browser and connect to https://localhost:8834. You will then \nbe prompted with a warning about an invalid SSL certificate used by Nessus. \nYou need to check the SSL certificate and then store the exception for that \nSSL certificate. ... |
{
"page_number": 70,
"text": "Chapter 1\n[ 49 ]\n4.\t After you have registered successfully, you will be able to download the \nnewest Nessus plugins. The plugins download process will take some time to \ncomplete; you can do something else while waiting for the download process \nto finish.\nInstalling the Cisco ... |
{
"page_number": 71,
"text": "Beginning with Kali Linux\n[ 50 ]\nThe chapter started with a brief description of Kali Linux's history. Next, it moved \non to see what functionalities Kali Linux has to offer. The latest version of Kali Linux \nhas many tools to help in penetration testing. Additionally, it also has ... |
{
"page_number": 72,
"text": "Penetration Testing \nMethodology\nPenetration testing, often abbreviated as pentest, is a process that is followed \nto conduct an in-depth security assessment or audit. A methodology defines a \nset of rules, practices, and procedures that are pursued and implemented during \nthe cou... |
{
"page_number": 73,
"text": "Penetration Testing Methodology\n[ 52 ]\nPenetration testing is considered to be the last and most aggressive form of security \nassessment. It must be handled by qualified professionals and can be conducted with \nor without prior knowledge of the targeted network or application. A pe... |
{
"page_number": 74,
"text": "Chapter 2\n[ 53 ]\nWhite box testing\nAn auditor involved in this kind of penetration testing process should be aware of all \nthe internal and underlying technologies used by the target environment. Hence, it \nopens a wide gate for a penetration tester to view and critically evaluate... |
{
"page_number": 75,
"text": "Penetration Testing Methodology\n[ 54 ]\nA key difference between the vulnerability assessment and penetration testing is \nthat the penetration testing goes beyond the level of identifying vulnerabilities and \nhooks into the process of exploitation, privilege escalation, and maintain... |
{
"page_number": 76,
"text": "Chapter 2\n[ 55 ]\nTherefore, you will be introduced to several well-known security assessment \nmethodologies that provide you with an extended view of the assessing network \nand application security by highlighting their key features and benefits. These \ninclude the following: \n•... |
{
"page_number": 77,
"text": "Penetration Testing Methodology\n[ 56 ]\nOpen Source Security Testing Methodology \nManual (OSSTMM)\nOpen Source Security Testing Methodology Manual (OSSTMM) (http://www.\nisecom.org/research/osstmm.html) is a recognized international standard \ncreated by Pete Herzog and developed by ... |
{
"page_number": 78,
"text": "Chapter 2\n[ 57 ]\n•\t\nDouble gray box: Double gray box testing works in a way that is similar to \ngray box testing, except that the time frame for an audit is defined and there \nare no channels and vectors being tested. White box audit is an example of \ndouble gray box testing.\n•... |
{
"page_number": 79,
"text": "Penetration Testing Methodology\n[ 58 ]\n•\t\nThe methodology itself follows a process of four individually connected \nphases, namely, definition phase, information phase, regulatory phase, \nand controls test phase. Each of these obtains, assesses, and verifies the \ninformation rega... |
{
"page_number": 80,
"text": "Chapter 2\n[ 59 ]\nThe output is a combination of operational activities, security initiatives, and a \ncomplete listing of vulnerabilities that might exist in the target environment. The \nassessment process chooses the shortest path to reach the test deadline by analyzing \nits targe... |
{
"page_number": 81,
"text": "Penetration Testing Methodology\n[ 60 ]\nOpen Web Application Security Project \n(OWASP) \nThe Open Web Application Security Project (OWASP) open community brings its \ntop 10 project forward to increase the awareness of application security. The project \nprovides you with a necessary... |
{
"page_number": 82,
"text": "Chapter 2\n[ 61 ]\n•\t\nWhen considering the security assessment of web infrastructure, the \nOWASP Testing Guide provides you with technology-specific assessment \ndetails; for instance, the testing of Oracle is approached differently than \nMySQL. Such a guide provides you with a wi... |
{
"page_number": 83,
"text": "Penetration Testing Methodology\n[ 62 ]\n•\t\nDevelopment view: The development view takes the developer's \npanorama forward by combining the set of attacks and weaknesses into \nvulnerabilities, which are likely to occur at any of three consecutive \ndevelopment phases. This could be... |
{
"page_number": 84,
"text": "Chapter 2\n[ 63 ]\n•\t\nThe standard provides you with three different views, namely, enumeration, \ndevelopment, and cross-reference. Enumeration serves as a base for all the \nattacks and weaknesses found in the web applications. The development \nview merges these attacks and weakne... |
{
"page_number": 85,
"text": "Penetration Testing Methodology\n[ 64 ]\nKey features and benefits\nThe following are the key features and benefits of the PTES:\n•\t\nIt is a very thorough penetration testing framework that covers the technical \nas well as other important aspects of a penetration test, such as scope... |
{
"page_number": 86,
"text": "Chapter 2\n[ 65 ]\n•\t\nMaintaining access\n•\t\nDocumentation and reporting\nWhether applying any combination of these steps with the black box or white box \napproaches, it is left to the penetration tester to decide and choose the most strategic \npath according to the given target ... |
{
"page_number": 87,
"text": "Penetration Testing Methodology\n[ 66 ]\n•\t\nArticles\n•\t\nBlogs \n•\t\nSocial networks \n•\t\nCommercial or non-commercial websites \nAdditionally, the data can also be gathered through various search engines, such \nas Google, Yahoo!, MSN Bing, Baidu, and others. Moreover, an audit... |
{
"page_number": 88,
"text": "Chapter 2\n[ 67 ]\nVulnerability mapping\nUp until the previous phase, we have gathered sufficient information about the \ntarget network. It is now time to identify and analyze the vulnerabilities based \non the disclosed ports and services. This process can be achieved via a number o... |
{
"page_number": 89,
"text": "Penetration Testing Methodology\n[ 68 ]\nPrivilege escalation\nOnce the target is acquired, the penetration is successful. An auditor can now move \nfreely into the system, depending on his or her access privileges. These privileges \ncan also be escalated using any local exploits that... |
{
"page_number": 90,
"text": "Chapter 2\n[ 69 ]\nThe ethics\nThe ethical vision of security testing constitutes rules of engagement that have to \nbe followed by an auditor to present professional, ethical, and authorized practices. \nThese rules define how the testing services should be offered, how the testing sh... |
{
"page_number": 91,
"text": "Penetration Testing Methodology\n[ 70 ]\nSummary\nIn this chapter, we have discussed several penetration testing methodologies. We \nhave also described the basic terminology of penetration testing, its associated types, \nand the industry contradiction with other similar terms. The su... |
{
"page_number": 92,
"text": "PART II\nPenetration \nTesters Armory\nTarget Scoping \nInformation Gathering\nTarget Discovery\nEnumerating Target\nVulnerability Mapping\nSocial Engineering\nTarget Exploitation\nPrivilege Escalation\nMaintaining Access\nDocumentation and Reporting\n"
} |
{
"page_number": 93,
"text": ""
} |
{
"page_number": 94,
"text": "Target Scoping\nTarget Scoping is defined as an empirical process to gather target assessment \nrequirements and characterize each of its parameters in order to generate a test \nplan, its limitations, business objectives, and time schedule. This process plays an \nimportant role in de... |
{
"page_number": 95,
"text": "Target Scoping\n[ 74 ]\nIt is highly recommended that you follow the scope process in order to ensure \ntest consistency and a greater probability of success. Additionally, this process \ncan also be adjusted according to the given situation and test factors. Without any \nsuch process... |
{
"page_number": 96,
"text": "Chapter 3\n[ 75 ]\nThe basic purpose of gathering client requirements is to open a true and authentic \nchannel by which the pentester can obtain any information that may be necessary for \nthe testing process. Once the test requirements have been identified, the client should \nvalida... |
{
"page_number": 97,
"text": "Target Scoping\n[ 76 ]\n•\t\nWho will be the point of contact for this project?\n•\t\nWhat is the timeline allocated for this project? \n•\t\nWhat is your budget for this project?\n•\t\nList any miscellaneous requirements, if necessary.\nThe deliverables assessment form\nThe following ... |
{
"page_number": 98,
"text": "Chapter 3\n[ 77 ]\n•\t\nStructured testing process: After analyzing the details provided by your \ncustomer, it may be important to restructure your testing methodology. \nFor instance, if the social engineering service is about to be excluded, you \nwould have to remove it from the fo... |
{
"page_number": 99,
"text": "Target Scoping\n[ 78 ]\n•\t\nPenetration testing contract: There is always the need for a legal contract \nthat will address the technical and business matters between the client and \npenetration tester. This is where the penetration testing contract comes in. \nThe basic information ... |
{
"page_number": 100,
"text": "Chapter 3\n[ 79 ]\n•\t\nIs there any third-party contractor to accomplish technology-specific \nassessment?\n•\t\nHave any steps been taken to bring the project to a graceful closure?\n•\t\nHas the disaster recovery plan been identified?\n•\t\nHas the cost of the test project been fin... |
End of preview.
No dataset card yet
- Downloads last month
- 5