

Pretending to be a vendor or Internet service provider (ISP) with an urgent matter can usually render a relevant mail stop or cubicle location to target explicitly. A simple call to a secretary, operator, or administrative assistant in the majority of companies can aid in honing in on valuable targets. Targeted attacks, such as those directed toward administrators of systems for relevant locations, are not that farfetched. In the “Brain Games” section of this chapter, two scenarios were described using social engineering methods to disseminate USB devices and gain access into a building. The picture we can paint for this attack can come in many flavors. Most of the utilities in BackTrack have been taken straight from the world of computer pirates others however have been developed by important companies within the computer security world: dnsmap, Netmask, PsTools, TCtrace, Nmap, Protos, Cisco vulnerability tools, SQL Inject, SMB-NAT, Pirana, Dsniff, Hydra, Sing, Wireshark, NSCX, Airsnort, SNORT, Hexedit.Brian Anderson, Barbara Anderson, in Seven Deadliest USB Attacks, 2010 Backtrack Attack via USB Look up all kinds of user manuals on the author's website.Includes a wide range of tools, from sniffers to keyloggers.Audit the security and strength of WEP and WPA passwords.In other words, you can run it on any computer, including Windows, from a CD, DVD or USB with VirtualBox or any other similar program. One of the most interesting aspects can be found in its design, conceived to be used just like a LiveCD as it comes in ISO format.


With this distribution you'll be able to get hold of an optimized version of Linux to audit the WiFi connections you manage.Īn essential toolbox to optimize your network's security. However, hardly any of them stand out as much as BackTrack, a comprehensive toolbox with over 300 utilities for different purposes. There are loads of Linux distributions focused on auditing the security of wireless networks.
