Dataset Preview
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code: DatasetGenerationError
Exception: TypeError
Message: Couldn't cast array of type
list<item: struct<page_number: int64, text: string>>
to
{'page_number': Value(dtype='int64', id=None), 'text': Value(dtype='string', id=None)}
Traceback: Traceback (most recent call last):
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1870, in _prepare_split_single
writer.write_table(table)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 622, in write_table
pa_table = table_cast(pa_table, self._schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2292, in table_cast
return cast_table_to_schema(table, schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2245, in cast_table_to_schema
arrays = [
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2246, in <listcomp>
cast_array_to_feature(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in wrapper
return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in <listcomp>
return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2108, in cast_array_to_feature
raise TypeError(f"Couldn't cast array of type\n{_short_str(array.type)}\nto\n{_short_str(feature)}")
TypeError: Couldn't cast array of type
list<item: struct<page_number: int64, text: string>>
to
{'page_number': Value(dtype='int64', id=None), 'text': Value(dtype='string', id=None)}
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1417, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1049, in convert_to_parquet
builder.download_and_prepare(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 924, in download_and_prepare
self._download_and_prepare(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1000, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1741, in _prepare_split
for job_id, done, content in self._prepare_split_single(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1897, in _prepare_split_single
raise DatasetGenerationError("An error occurred while generating the dataset") from e
datasets.exceptions.DatasetGenerationError: An error occurred while generating the datasetNeed help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
pages dict |
|---|
{
"page_number": 1,
"text": ""
} |
{
"page_number": 2,
"text": "The Basics of hacking \nand penetration testing\n"
} |
{
"page_number": 3,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 4,
"text": "The Basics of Hacking \nand Penetration Testing\nEthical Hacking and Penetration \nTesting Made Easy\nPatrick Engebretson\nTechnical Editor\nJames Broad\n \nAmsterdam • Boston • Heidelberg • London • New York \nOxford • Paris • San Diego • San Francisco \nSingapore • Sydney • Tokyo \... |
{
"page_number": 5,
"text": "For information on all Syngress publications visit our website at www.syngress.com\nAcquiring Editor: Angelina Ward\nDevelopment Editor: Heather Scherer\nProject Manager: Jessica Vaughan\nDesigner: Alisa Andreola\nSyngress is an imprint of Elsevier\n225 Wyman Street, Waltham, MA 02451, ... |
{
"page_number": 6,
"text": "This book is dedicated to God, Lorianna, Maggie, and Molly. You are the steel \ncables that bind me. I love you.\nDedication\nv\n"
} |
{
"page_number": 7,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 8,
"text": "ACKNOWLEDGMENTS...............................................................................ix\nABOUT THE AUTHOR................................................................................xi\nABOUT THE TECHNICAL EDITOR............................................................. x... |
{
"page_number": 9,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 10,
"text": "Like most people, I have a list. The list is made up of life goals and dreams—\nthings I would like to accomplish at some point in my life. Some of the \nitems on the list are big, some small, some well-defined, stable, and concrete, \nwhereas others are more transient and ambiguous—li... |
{
"page_number": 11,
"text": "Acknowledgments\nx\nMary and Joseph, princesses, Barbie’s, and the Pirate Ship! Daddy loves you \nmore than life itself.\nMy Family\nThanks to my mother and father for the gift of education and teaching me to \nunderstand the value of hard work and dedication to a project. Thanks also ... |
{
"page_number": 12,
"text": "Dr. Patrick Engebretson obtained his Doctor of Science degree with a spe-\ncialization in information security from Dakota State University. He currently \nserves as an assistant professor of information assurance and also works as a \nsenior penetration tester for a security firm in t... |
{
"page_number": 13,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 14,
"text": "xiii\nJames Broad (CISSP, C|EH, C)PTS, Security, MBA) is the President and \nowner of Cyber-Recon, LLC, where he and his team of consultants special-\nize in Information Security, Information Assurance, and Certification and \nAccreditation and offer other security consultancy service... |
{
"page_number": 15,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 16,
"text": "I suppose there are several questions that may be running through your head \nas you contemplate reading this book: Who is the intended audience for this \nbook? How is this book different from book ‘x’ (insert your favorite title here)? \nWhy should I buy it? Because these are all fai... |
{
"page_number": 17,
"text": "Introduction\nxvi\nmuch like modern-day swimming pools. Zero entry pools gradually slope from \nthe dry end to the deep end, allowing swimmers to wade in without feeling \noverwhelmed or without having a fear of drowning. The “zero entry” concept \nallows everyone the ability to use th... |
{
"page_number": 18,
"text": "Introduction \nxvii\nreader to learn Nmap (or any tool) without having to worry about the changes \nin functionality that often accompany advanced features in version changes.\nThe goal of this book is to provide general knowledge that will allow you to \ntackle advanced topics and bo... |
{
"page_number": 19,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 20,
"text": "1\nINTRODUCTION\nPenetration testing can be defined as a legal and authorized attempt to locate \nand successfully exploit computer systems for the purpose of making those sys-\ntems more secure. The process includes probing for vulnerabilities as well as \nproviding proof of concept (... |
{
"page_number": 21,
"text": "The Basics of Hacking and Penetration Testing\n2\nbeyond vulnerability assessments by simulating hacker activity and delivering \nlive payloads. In this book, we will cover the process of vulnerability assess-\nment as one of the steps utilized to complete a penetration test.\nSetting ... |
{
"page_number": 22,
"text": "What Is Penetration Testing? CHAPTER 1\n3\ndifferences can be boiled down to three key points: authorization, motivation, \nand intent. It should be stressed that these points are not all inclusive, but they \ncan be useful in determining if an activity is ethical or not.\nThe first a... |
{
"page_number": 23,
"text": "The Basics of Hacking and Penetration Testing\n4\nto view your organization through the eyes of the enemy. This process can lead \nto many surprising discoveries and give you the time needed to patch your sys-\ntems before a real attacker can strike.\nOne of the great things about lear... |
{
"page_number": 24,
"text": "What Is Penetration Testing? CHAPTER 1\n5\nA basic understanding of Linux will be beneficial and will pay you mountains \nof dividends in the long run. For the purpose of this book, there will be no \nassumption that you have prior Linux experience, but do yourself a favor and \ncommi... |
{
"page_number": 25,
"text": "The Basics of Hacking and Penetration Testing\n6\ndecide which version is best for you. This book will rely heavily on the use of \na Backtrack VMware image and VMware Player. At the time of writing, VMware \nPlayer was available at: http://www.vmware.com/products/player/. You will \nn... |
{
"page_number": 26,
"text": "What Is Penetration Testing? CHAPTER 1\n7\nNotice the default password is simply “root” spelled backward. This default \nusername and password combination has been in use since Backtrack 1, and \nmost likely it will remain in use for future versions. At this point, you should \nbe log... |
{
"page_number": 27,
"text": "The Basics of Hacking and Penetration Testing\n8\ninterface is your loopback interface. The “eth0” is your first ethernet card. \nDepending on your hardware, you may have additional interfaces or differ-\nent interface numbers listed. If you are running Backtrack through a VM, your \nm... |
{
"page_number": 28,
"text": "What Is Penetration Testing? CHAPTER 1\n9\nBefore proceeding, you should take several minutes to review and practice all \nthe steps highlighted thus far including\nn\t Power on/Start up Backtrack\nn\t Log in with the default user name and password\nn\t Start X (the windows GUI)\nn\t ... |
{
"page_number": 29,
"text": "The Basics of Hacking and Penetration Testing\n10\nAlthough the use of physical machines to create a hacking lab is an accept-\nable solution, the use of virtual machines provides several key benefits. First, \ngiven today’s processing power, it is easy to set up and create a mini hack... |
{
"page_number": 30,
"text": "What Is Penetration Testing? CHAPTER 1\n11\nFor example, some methodologies use the term “Information Gathering,” \nwhereas others call the same process “Reconnaissance.” For the purpose of this \nbook, we will focus on the activities of the phase rather than the name. After \nyou hav... |
{
"page_number": 31,
"text": "The Basics of Hacking and Penetration Testing\n12\ninformation was collected in the initial phase and later turned out to be a cru-\ncial component for successfully completing an exploit and gaining access to \nthe system. In later phases, we begin to drill down and focus on more speci... |
{
"page_number": 32,
"text": "What Is Penetration Testing? CHAPTER 1\n13\nZero Entry Hacking: A Four-Step Model\nLet us briefly review each of the four steps that will be covered so you have a \nsolid understanding of them. The first step in any penetration test is “recon-\nnaissance.” This phase deals with inform... |
{
"page_number": 33,
"text": "The Basics of Hacking and Penetration Testing\n14\nbe readable (and comprehendible) by both technical and nontechnical person-\nnel. It is important not to fill the executive summary with too many technical \ndetails; that is the purpose of the detailed report.\nCHAPTER REVIEW\nThis ch... |
{
"page_number": 34,
"text": "15\nReconnaissance\nCHAPTER 2\nInformation in This Chapter:\nn\t HTTrack: Website Copier\nn\t Google Directives—Practicing Your Google-Fu\nn\t The Harvester: Discovering and Leveraging E-mail Addresses\nn\t Whois\nn\t Netcraft\nn\t Host\nn\t Extracting Information from DNS\nn\t Extract... |
{
"page_number": 35,
"text": "The Basics of Hacking and Penetration Testing\n16\nIntroduction\nIn most cases people who attend hacking workshops or classes have a basic \nunderstanding of a few security tools. Typically, these students have used a \nport scanner to examine a system or maybe they have used Wireshark... |
{
"page_number": 36,
"text": "Reconnaissance CHAPTER 2\n17\nof tools, the absence of well-defined rules of engagement also distinguishes this \nphase from all others. This is in stark contrast to the remaining steps in our \nmethodology. For example, when we discuss scanning in Chapter 3, there is a \nspecific ord... |
{
"page_number": 37,
"text": "The Basics of Hacking and Penetration Testing\n18\nIn Chapter 1, it was pointed out that a major difference between black hat and \nwhite hat attackers is authorization. Step 1 provides us with a prime example of \nthis. Both types of hackers conduct exhaustive reconnaissance on their ... |
{
"page_number": 38,
"text": "Reconnaissance CHAPTER 2\n19\nHTTrack: Website Copier\nTypically, we begin step 1 by closely reviewing the target’s website. In some \ncases, we may actually use a tool called HTTrack to make a page-by-page copy \nof the website. HTTrack is a free utility that creates an identical, of... |
{
"page_number": 39,
"text": "The Basics of Hacking and Penetration Testing\n20\ncomputer. Utilizing a website copying tool like HTTrack allows us to explore \nand thoroughly mine the website “off-line” without having to spend additional \ntime traipsing around on the company’s web server.\nAfter we have installed ... |
{
"page_number": 40,
"text": "Reconnaissance CHAPTER 2\n21\nASA experience. From this post, you can draw some immediate conclusions \nand make some educated guesses. First, you can be certain that the company \neither uses, or is about to use, a Cisco ASA firewall. Second, depending on the \nsize of the organizati... |
{
"page_number": 41,
"text": "The Basics of Hacking and Penetration Testing\n22\nAlthough this answer is fine for 99 percent of the planet, it is not good enough \nfor aspiring hackers. You have to learn to search in a smarter way and maxi-\nmize the return results. In short, you must cultivate your Google-Fu. Lear... |
{
"page_number": 42,
"text": "Reconnaissance CHAPTER 2\n23\nto about 50. There is little doubt that a person can sort through and gather \ninformation from 50 hits much quicker than 600. Second and possibly more \nimportantly, every single returned result comes directly from the target website. \nUtilizing the “si... |
{
"page_number": 43,
"text": "The Basics of Hacking and Penetration Testing\n24\nadministrator for a company. You use MS Excel to create a simple workbook \ncontaining all the IP addresses, computer names, and locations of the PCs in \nyour network. Rather than carrying this Excel spreadsheet around, you decide \nt... |
{
"page_number": 44,
"text": "Reconnaissance CHAPTER 2\n25\nutilizes Google directives and the second shows the results from a traditional \nsearch. Utilizing Google directives has drastically reduced the number of hits \n(by 33,364!).\nThere are many other types of directives and Google hacks that you should \nbe... |
{
"page_number": 45,
"text": "The Basics of Hacking and Penetration Testing\n26\nlittle social engineering you befriend the unsuspecting admin and follow him \non both Facebook and Twitter. After a few weeks of boring posts, you strike the \njackpot. He makes a post on Facebook that says “Great. Firewalled died wit... |
{
"page_number": 46,
"text": "Reconnaissance CHAPTER 2\n27\n3.\t Highlight “Information Gathering.”\n4.\t Highlight “All.”\n5.\t Select “TheHarvester” (note, tools are listed in alphabetical order).\nYou can also open a terminal window and navigate to the Harvester directory \nby issuing the following command:\ncd... |
{
"page_number": 47,
"text": "The Basics of Hacking and Penetration Testing\n28\nin finding at least two additional subdomains. Both “booksite.syngress.com” \nand “ebook__www.syngress.com” need to be fully recon’d. We simply add these \nnew domains to our target list and begin the reconnaissance process again.\nSte... |
{
"page_number": 48,
"text": "Reconnaissance CHAPTER 2\n29\nFor example, to find out information about Syngress, we would issue the fol-\nlowing command: “whois syngress.com.” Figure 2.4 shows a partial output \nfrom the result of this tool.\nIt is important to record all the information and pay special attention ... |
{
"page_number": 49,
"text": "The Basics of Hacking and Penetration Testing\n30\nWe can conduct a further whois search by following the link provided in the \n“Referral URL:” field. You may have to search the webpage for a link to their \nWhois service. By using Safename’s whois service, we can extract a significan... |
{
"page_number": 50,
"text": "Reconnaissance CHAPTER 2\n31\n [TECHNICAL]\n Organisation Name: International Domain Tech\n Contact Name: International Domain Tech\n Address Line 1: PO Box 5085\n Address Line 2:\n City/Town: Milton Keynes MLO\n State/Province: ... |
{
"page_number": 51,
"text": "The Basics of Hacking and Penetration Testing\n32\nIn our previous searches, we uncovered a DNS server with the host name “ns1.\ndreamhost.com.” To translate this into an IP address, we would enter the fol-\nlowing command in a terminal:\nhost ns1.dreamhost.com\nFigure 2.9 shows the re... |
{
"page_number": 52,
"text": "Reconnaissance CHAPTER 2\n33\nother things, DNS is responsible for the process of translating domain names \nto IP addresses. As humans, it is much easier for us to remember “google.com” \nrather than http://74.125.95.105. However, machines prefer the reverse. DNS \nserves as the midd... |
{
"page_number": 53,
"text": "The Basics of Hacking and Penetration Testing\n34\ndeploy multiple DNS servers for the sake of redundancy or load balancing. As \na result, DNS servers need a way to share information. This “sharing” process \noccurs through the use of a zone transfer. During a zone transfer, also com-... |
{
"page_number": 54,
"text": "Reconnaissance CHAPTER 2\n35\nWe wrap up our initial DNS interrogation with NS Lookup by entering the tar-\nget domain after the next “>” prompt.\nSuppose you wanted to know what mail server is used to handle the e-mail for \nSyngress. In a previous example, we determined that one of ... |
{
"page_number": 55,
"text": "The Basics of Hacking and Penetration Testing\n36\nIf zone transfers are allowed and not restricted, you will be presented with a \nlisting of host and IP addresses from the target DNS server that relate to your \ntarget domain.\nBacktrack has many additional tools that can be used to ... |
{
"page_number": 56,
"text": "Reconnaissance CHAPTER 2\n37\nthe file owner or username of the person who created the file, and the location \nor path where the file was saved. This process occurs automatically without any \nuser input or interaction.\nThe ability of an attacker to read this information may present... |
{
"page_number": 57,
"text": "The Basics of Hacking and Penetration Testing\n38\nSocial engineering\nNo discussion of reconnaissance would be complete without including social \nengineering. Many people would argue that social engineering is one of the \nmost simple and effective means for gathering information abo... |
{
"page_number": 58,
"text": "Reconnaissance CHAPTER 2\n39\non the drive. In this example though, the thumb drive or CD is preloaded with \na self-executing backdoor program that automatically launches when the drive \nis inserted into the computer. The backdoor is capable of bypassing the com-\npany firewall and ... |
{
"page_number": 59,
"text": "The Basics of Hacking and Penetration Testing\n40\nWhile making a list of potential targets to conduct reconnaissance on, try to \nfocus on company names that you have not heard of before. Any good news-\npaper or website should contain dozens of companies that you are unfamil-\niar wi... |
{
"page_number": 60,
"text": "Reconnaissance CHAPTER 2\n41\nlocation or IP address of your firewall, or they can be personal, such as \nthe physical location of your currently (travelling) salesman. Learning to \nmaster Maltego takes a little effort but is well worth your time. A free \nversion is available in Bac... |
{
"page_number": 61,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 62,
"text": "43\nIntroduction\nOnce step 1 has been completed, you should have a solid understanding of \nour target and a detailed collection of gathered information. This data mainly \nincludes our collection of IP addresses. Recall that one of the final steps in \nreconnaissance was to create a ... |
{
"page_number": 63,
"text": "The Basics of Hacking and Penetration Testing\n44\nattackable IP addresses. In step 2, we will map IP addresses to open ports and \nservices.\nIt is important to understand that it is the job of most networks to allow at \nleast some communication to flow into and out of their borders.... |
{
"page_number": 64,
"text": "Scanning CHAPTER 3\n45\nTable 3.1 Common Port Numbers and Their Corresponding Service\nPort Number\nService\n20\nFTP data transfer\n21\nFTP control\n22\nSSH\n23\nTelnet\n25\nSMTP (e-mail)\n53\nDNS\n80\nHTTP\n443\nHTTPS\nor sliding glass door off the deck. An unconventional person ma... |
{
"page_number": 65,
"text": "The Basics of Hacking and Penetration Testing\n46\ntarget is not directly accessible via the Internet. Whether we are going after \nsome supersecret internal machine or simply attempting to gain access to a \nnetwork, we usually begin by scanning the perimeter devices. The reason for \... |
{
"page_number": 66,
"text": "Scanning CHAPTER 3\n47\nour machine. The “bytes32” in the line indicate the size of the packet being \nsent. The “time26 ms” is telling you how long the entire round trip took for \nthe packets to travel to and from the target. The “TTL240” is a Time To Live \nvalue; this is used t... |
{
"page_number": 67,
"text": "The Basics of Hacking and Penetration Testing\n48\nOnce you have run the command above, you can open the hosts.txt file that \nwas created to find a list of target machines that responded to our pings. These \nIP addresses should be added to your target list for later investigation. It... |
{
"page_number": 68,
"text": "Scanning CHAPTER 3\n49\nyour main goal will be to get an administrative shell or backdoor access to the \nmachine. This shell is literally a terminal that allows you to control the target PC \nfrom the command line. It looks and feels just like the terminals that we have \nbeen workin... |
{
"page_number": 69,
"text": "The Basics of Hacking and Penetration Testing\n50\nattempts to complete the three-way handshake on each port specified in the \nNmap command. Because this scan actually completes the three-way hand-\nshake and then tears down the connection gracefully, there is little chance that \nyou... |
{
"page_number": 70,
"text": "Scanning CHAPTER 3\n51\nIssuing this command will cause Nmap to port scan all the hosts between the \nIP addresses 172.16.45.1 and 172.16.45.254. Just like ping sweeps, this is a \nvery powerful technique that can greatly improve the productivity of your scan-\nning life!\nIf you need... |
{
"page_number": 71,
"text": "The Basics of Hacking and Penetration Testing\n52\nconnection was never 100 percent established. There are applications and log \nfiles that require the completion of the three-way handshake before they begin \nrecording activity. As a result, if a log file only records completed conne... |
{
"page_number": 72,
"text": "Scanning CHAPTER 3\n53\nis like reading the Cliff Notes version of a book. You will probably have a solid \nunderstanding of the story, but you arre likely to miss many of the details.\nIt is important to understand that both TCP Connect scans and SYN scans use \nTCP as the basis for ... |
{
"page_number": 73,
"text": "The Basics of Hacking and Penetration Testing\n54\ndropped from the scan. The reason for this is simple. UDP scans are very slow; \nrunning even a basic UDP scan on the default 1,000 ports can take 20–30 min-\nutes. You may also notice that the IP address has changed. In this example, ... |
{
"page_number": 74,
"text": "Scanning CHAPTER 3\n55\nTo elicit a more useful response from our target, we can add the “–sV” switch \nto our UDP scan. The “–sV” switch is used for version scanning but, in this \ncase, can also help us narrow the results of our UPD scan.\nWhen version scanning is enabled, Nmap send... |
{
"page_number": 75,
"text": "The Basics of Hacking and Penetration Testing\n56\nWindows. As a result, Xmas Tree and Null scans are rather ineffective against \nMicrosoft targets.\nTo execute an Xmas Tree scan, we simply replace the “-sU” switch from our last \nexample with an “-sX.” To run the full scan in the ter... |
{
"page_number": 76,
"text": "Scanning CHAPTER 3\n57\nWith the previous two paragraphs in mind, consider the following example. \nAssume that our Network Admin Ben Owned puts a simple firewall in front \nof his system to prevent anyone outside of his network from connecting to \nthe system. The firewall works by s... |
{
"page_number": 77,
"text": "The Basics of Hacking and Penetration Testing\n58\nOnce we have completed port scanning our target, we should have a list of \nopen ports and services. This information should be documented and reviewed \nclosely. While reviewing the Nmap output, you should take a few moments to \natte... |
{
"page_number": 78,
"text": "Scanning CHAPTER 3\n59\n3.\t Install the program.\n4.\t Create a Nessus user to access the system.\n5.\t Update the plug-ins.\nOne of the key components of Nessus is the plug-ins. A plug-in is a small \nblock of code that is sent to the target machine to check for a known vulner-\nabi... |
{
"page_number": 79,
"text": "The Basics of Hacking and Penetration Testing\n60\ncheck has the potential to cause network and system disruptions or even take \nsystems off-line. By setting up one policy with the “Safe Checks” enabled and \none with the “Safe Checks” disabled, you can avoid unintentional network \nd... |
{
"page_number": 80,
"text": "Scanning CHAPTER 3\n61\nYou need to enter a name for the scan, select a policy, and enter the IP address \nof your targets. You can enter your target IP addresses individually in the “Scan \nTargets” box or if you have your target IP addresses saved to a text file, you can \nuse the “... |
{
"page_number": 81,
"text": "The Basics of Hacking and Penetration Testing\n62\n#!/bin/bash\necho \"Setting up the victim machine, this will take just a \nmoment...\"\nifconfig eth0 down\nifconfig eth0 172.16.45.$((( $RANDOM %254) 1)) up\n# uncomment the following lines by removing the #, to start up \nservices ... |
{
"page_number": 82,
"text": "Scanning CHAPTER 3\n63\nSummary\nThis chapter focused on step 2 that consists mainly of scanning. The chapter \nstarted with a brief overview of pings and ping sweeps before moving into the \nspecifics of scanning. The topic of scanning is further broken down into two \ndistinct types... |
{
"page_number": 83,
"text": "This page intentionally left blank\n"
} |
{
"page_number": 84,
"text": "65\nIntroduction\nExploitation is the process of gaining control over a system. This process can \ntake many different forms but for the purpose of this book the end goal always \nremains the same: administrative-level access to the computer. In many ways, \nExploitation\nCHAPTER 4\nIn... |
{
"page_number": 85,
"text": "The Basics of Hacking and Penetration Testing\n66\nexploitation is the attempt to turn the target machine into a puppet that will \nexecute your commands and do your bidding. Just to be clear, exploitation is \nthe process of launching an exploit. An exploit is the realization of a vul... |
{
"page_number": 86,
"text": "Exploitation CHAPTER 4\n67\nneed to expand your knowledge of systems and their exploits. Eventually, you \nwill learn how to create custom exploits.\nYou can use the previous step’s output as a guide for where to begin your \nexploitation attempts. The output from scanning should be u... |
{
"page_number": 87,
"text": "The Basics of Hacking and Penetration Testing\n68\nwhen logging in, and the name of the service you are attempting to authenti-\ncate with.\nOne of the requirements listed above is a dictionary list. A password dictionary \nis a file that contains a list of potential passwords. These l... |
{
"page_number": 88,
"text": "Exploitation CHAPTER 4\n69\nThe “-u” is used to denote a single username that Medusa will use to \nattempt log-ins.\nIf you generated a list of usernames and would like to attempt to log in \nwith each of the names on the list, you can issue a capital “-U” followed by \nthe path to th... |
{
"page_number": 89,
"text": "The Basics of Hacking and Penetration Testing\n70\nThe first line shows the command we issued; the second line is an informa-\ntional banner that is displayed when the program begins. The remaining lines \nshow a series of log-in attempts with the username “ownedb” and various pass-\nw... |
{
"page_number": 90,
"text": "Exploitation CHAPTER 4\n71\nBefore the release of Metasploit, security researchers had two main choices: \nthey could develop custom code by piecing together various exploits and pay-\nloads or they could invest in one of the two commercially available exploit \nframeworks, CORE Impac... |
{
"page_number": 91,
"text": "The Basics of Hacking and Penetration Testing\n72\nMetasploit, but this book will focus on using the menu-driven, non-GUI, \ntext-based system called the Msfconsole. Once you understand the basics, \nthe Msfconsole is fast, friendly, intuitive, and easy to use. When possible, you \nsho... |
End of preview.
No dataset card yet
- Downloads last month
- 6