首页 | 本学科首页   官方微博 | 高级检索  
     

BackTrack5在网络渗透取证技术中的应用
引用本文:杨泽明.BackTrack5在网络渗透取证技术中的应用[J].软件,2014(3):142-143.
作者姓名:杨泽明
作者单位:苏州工业园区职业技术学院,江苏苏州215021
摘    要:本文对目前针对Linux平台下的BackTrack5进行阐述,内容涵盖敏感信息收集,漏洞信息收集,漏洞工具测试,账户特权升级等,笔者对在虚拟机环境下运行,下载BackTrack5,加载运行BackTrack5后需要进行网络配置加以说明,同时针对各种工具的常用命令及基本应用,实践后对其优缺点加以说明。

关 键 词:渗透测试  信息收集  漏洞攻击  帐户提权

BackTrack5 Forensics Technology Application in Network
YANG Ze-ming.BackTrack5 Forensics Technology Application in Network[J].Software,2014(3):142-143.
Authors:YANG Ze-ming
Affiliation:YANG Ze-ming ( Suzhou Indusrial park Institute of Vocational Technology ,Jiangsu, Suzhou 215021,China)
Abstract:in this paper, the widely used Linux platform BackTrack5 is described, including sensitive information collection, vulnerability information collection, vulnerability testing tool, account privileges upgrade, how to run in a virtual machine environment, download the BackTrack5, loading after running BackTrack5 the need for the network configuration, the above several applications, commonly used commands all kinds of tools. The basic application, and the advantages and disadvantages in the practice is described.
Keywords:Back Track  BackTrack penetration testing  information collection  vulnerability  account elevation of privilege
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号