![]() ![]() As a penetration tester, we often try to maintain a stealthy or undetected presence. Unlike Microsoft Windows or many of the modern-day Linux OS's, by default, some versions of Backtrack do not come with networking enabled. If you are utilizing Kali Linux, after logging in with the default root/toor user name and password you will be automatically loaded to the GUI-based Gnome desktop environment.įIGURE 1.2. Just like Microsoft Windows, you can interact with these items by moving your mouse cursor and clicking on the desired object. Once it has completely loaded, you will see a desktop, icons, a taskbar, and a system tray. This environment should seem vaguely familiar to most computer users. ![]() ![]() You can start the GUI by typing the following command after the “ :∼#” prompt:Īfter typing this command and hitting the Enter key, X will begin to load. Although it is possible to run many of the tools we will discuss in this book directly from the terminal, it is often easier for newcomers to make use of the X Window System. At this point, if you are running Backtrack, you should be logged into the system and should be presented with “ :∼#” prompt. This default user name and password combination has been in use since Backtrack 1, and most likely it will remain in use for future versions. Notice the default password is simply “root” spelled backward. The default user name is root and the default password is toor. Regardless of whether you choose to run Kali or Backtrack as either a VM or Live DVD, once the initial system is loaded you will be presented with a login prompt. Read more Navigate Downĭr.Patrick Engebretson, in The Basics of Hacking and Penetration Testing (Second Edition), 2013 Working with Your Attack Machine: Starting the Engine If you aren’t at the same location as the data center, making this mistake could delay the server’s reboot until you contact someone at the data center who can walk over to it and physically restart it. If you stop it instead of rebooting it, then someone who has physical access to it might have to start it up again. One thing you need to be sure of is that you request that the server be rebooted as opposed to just shutting it down. Be sure you’re following all protocols before restarting a server. Rebooting a server isn’t a difficult thing to do, but some organizations have even tighter restrictions about rebooting a server than stopping and restarting an application. f-Forces all currently running programs to quit prior to the shutdown occurring y-Answers “yes” to all prompts that are displayed during the shutdown process t:xx-The time (in seconds) to delay before shutting down the remote computer r-Causes a restart instead of a shutdown Omitting this parameter will cause the computer on which the command was entered to be shut down m \\computername-Specifies the remote computer to be shut down. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |