Ethical Hacking and Penetration Testing Guide



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə39/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   35   36   37   38   39   40   41   42   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Postgresql
By default, BackTrack 5 box does not come with postgresql. However, Metasploit does support post-
gresql databases. In order to install postgresql, we need to issue the following command in the console.
apt–get install postgresql


Linux Basics
◾ 
51
Once postgresql is successfully installed on your BackTrack 5 box, all you need to do is issue 
the following service init script in order to start the postgresql service.
/etc/init.d/postgresql start
However, if you are still facing problems in getting postgresql up and running, don’t worry. 
We shall get to it once we reach the “Remote exploitation” chapter of this book.
BackTrack 5 also offers a wide variety of other services, such as tftpd and apache, which you 
can also run from the command line and which are also present in the KDE menu. The services 
are present in the BackTrack 

Services tab in the main menu.
Other Online Resources

http://Linux.org

http://beginLinux.org

http://Linux-tutorial.info

BackTrack-Linux.org



53
Chapter 3
Information Gathering 
Techniques
There is a saying that goes “The more information you have about the target, the more is the 
chance of successful exploitation.” Information gathering is the first phase of hacking. In this 
phase, we gather as much information as possible regarding the target’s online presence, which 
in turn reveal useful information about the target itself. The required information will depend 
on whether we are doing a network pentest or a web application pentest. In the case of a network 
pentest, our main goal would be to gather information on the network. The same applies to web 
application pentests. In this module, we will discuss numerous methods of real-world information 
intelligence.
In general, all information gathering techniques can be classified into two main categories:
1. Active information gathering
2. Passive information gathering

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   35   36   37   38   39   40   41   42   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin