Linux Basics
◾
51
Once postgresql is successfully installed on your BackTrack 5 box,
all you need to do is issue
the following service init script in order to start the postgresql service.
/etc/init.d/postgresql start
However, if you are still facing problems in getting postgresql up and running, don’t worry.
We shall get to it once we reach the “Remote exploitation” chapter of this book.
BackTrack 5 also offers a wide variety of other services,
such as tftpd and apache, which you
can also run from the command line and which are also present in the KDE menu. The services
are
present in the BackTrack
→
Services tab in the main menu.
Other Online Resources
◾
http://Linux.org
◾
http://beginLinux.org
◾
http://Linux-tutorial.info
◾
BackTrack-Linux.org
53
Chapter 3
Information Gathering
Techniques
There is a saying that goes “The more information you have about the target, the more is the
chance of successful exploitation.” Information gathering is the first phase of hacking. In this
phase, we gather as much information as possible regarding the target’s
online presence, which
in turn reveal useful information about the target itself. The required information will depend
on whether we are doing a network pentest or a web application pentest.
In the case of a network
pentest, our main goal would be to gather information on the network. The same applies to web
application pentests. In this module, we will discuss numerous methods
of real-world information
intelligence.
In general, all information gathering techniques can be classified into two main categories:
1. Active information gathering
2. Passive information gathering
Dostları ilə paylaş: