Beggsseat November 20,2015 The video discusses four topics with reconnaissance of client, how exposed or soft is the internal network, use of nmap with firewalls on and off and internal surveillance of employees. I found it interesting to learn at an overall level how BackTrack5 can perform all these functions on the network. The examples were helpful and highlighted was is involved in penetration testing, which is something completely new for me. I especially liked the use of Maltego to transform the domain and identify interrelationships. I found it helpful when he mentioned that his VM wasn't working well. I wonder if that is because there were no results from his early screens (I'm noticing this with my VM as I work on the project, that a downloaded program won't open a file without an error message. It simply doesn't open. One of the things, I enjoy about this course is the connections we can make across projects.
aholcom2at November 21,2015 This was a awesome video on explain some good information gathering techniques. I’ve been using Maltego a bit for the past few weeks for basic information gathering (trying to get it setup for malware forensics), and I have always been stunned on how easy and powerful it is. Another part of this video I enjoyed was watching the user setup driftnet. I had never heard of driftnet but now I want to go back to Kali Linux and try it out!
hanna88at November 23,2015 I haven't done anything in the realm of penetration testing, so it was nice that he breaks the steps down and explains what is going on. Seems like one of those things I won't really be able to appreciate or understand until I download and practice myself (pretty much the theme of this entire field). So many tools out there-lots of which are free-that are incredibly powerful.
tshafiat November 23,2015 This is primarily a tutorial for BackTrack, and it is a great video for whetting the appetite for intrusion analysis. I feel inspired to try this tool, especially the Malt ego and NMAP tools. There are lots of tools for discovering IP addresses on the network. There are also many port sniffers, but NMAP found open ports even with the firewall on. BackTrack has a lot of incredible tools. ARPSPOOF was interesting since it is like a covert packet sniffer, with its MAC spoof and packet sniffing functionality. The dotslashbacktrack.com domain is discontinued, as is the BackTrack 5 tool. It has apparently been reintroduced as Kali Linux 2.0. The tool appears to only be available for Linux systems.
haygaffat November 24,2015 I like the over view of the Back Track tool. Maltego, Drift Net, and NMAP all yield extremely detailed and valuable information. It is pretty amazing how far technology and applications have come. With tools like Back Track 5 a trained investigator or even a beginner can find there way around well enough to discover the needed data to support or denied a claim.