Documentos de Académico
Documentos de Profesional
Documentos de Cultura
● Backtrack
● Concluciones
● Preguntas
Estructura de un ataque
● Recopilacion de informacion
- Nivel web
SEAT
Metagoofil
- ubicación
Google maps
- Personas
Whois
Ing. Social
- Sistemas
Fingerpriting
● Ingienieria Social
- Fakes
Phishing
SET
-Ataques de Diccionario
hydra
medussa
John the Ripper
BruteSSH
-Google
http://www.phenoelit-us.org/dpl/dpl.html
● Sniffing Password
-Https / HTTP
-Basic Network
-telnet
-FTP
sslstrip
DSniff
ettercap
wireshark
● Spoofing
-DNS spoofing
ettercap
-IP spoofing
nmap
nectat
-ARP spoofing
ettercap
-MAC spoofing
macchanger
● MitM
-Filters
ettercap
● 4 Actualizaciones off (parches) =
Sistemas vulnerables
-Bugs S.O
-Obtener Acceso
-Obtener informacion
● Exploits
-Buffer overflow
-Configuracion
-Ejecucion
Metasploit
exploit-db
Milw0rm
Inyect0r
Inguma
Fast-track
● Backdoors
-Listen ports
-Servicies
netcat
crypcat
scripts perl
● Tunneling
-TunnelingSSH
openSSH (Servidor/Cliente)
● Botnets
● Bugs Web
-Inyection SQL
-XSS
-Bug Server aplication
SQL ninja
SQLmap
Xsss
Backtrack
● Suite Pentest
v1,v2,v3 ----> slax
v4 ----> ubuntu
● Desarrolladores
remote-exploit
● Estable
● Mas 300 tools
Tools
Informatio Gathering
Networking mapping
Vulnerability Identification
Web application Analysis
Radio network analysis
penetration
Privilege Escalation
Maintaining Access
Digital Forensics
Reverse Engieneering
Voive Over IP
Misecellaneous
Concluciones
Preguntas
Obtenga Backtrack 4
● http://www.backtrack-linux.org/
● http://www.backtrack-linux.org/forums
Gracias