After understanding the concept of penetrant testing, the next step is to learn the various tools used in penetrant testing. Before you do a penetrant test, you need to understand the tools needed to penetrate. The tools required to penetrate the test are as shown in table 1-1:
Table 1-1 Tools required for penetration
Splint |
Unhide |
Scrub |
Pscan |
Examiner |
Ht |
Flawfinder |
Srm |
Driftnet |
Rats |
Nwipe |
Binwalk |
Ddrescue |
Firstaidkit-gui |
Scalpel |
GParted |
Xmount |
Pdfcrack |
TestDisk |
Dc3dd |
Wipe |
Foremost |
Afftools |
Safecopy |
Sectool-gui |
Scanmem |
Hfsutils |
Unhide |
Sleuthkit |
Cmospwd |
Examiner |
Macchanger |
Secuirty-menus |
Srm |
Ngrep |
Nc6 |
Nwipe |
ntfs-3g |
Mc |
Firstaidkit-gui |
Ntfsprogs |
Screen |
Net-snmp |
Pcapdiff |
Openvas-scanner |
HexEdit |
Netsed |
Rkhunter |
Irssi |
Dnstop |
LaBrea |
PowerTOP |
SSLstrip |
Nebula |
Mutt |
Bonesi |
Tripwire |
Nano |
Proxychains |
Prelude-lml |
vim-enhanced |
Prewikka |
Iftop |
Wget |
Prelude-manager |
Scamper |
Yum-utils |
Picviz-gui |
Iptraf-ng |
Mcabber |
Telnet |
Iperf |
Firstaidkit-plugin-all |
Onenssh |
Nethogs |
Vnstat |
Dnstracer |
Uperf |
Aircrack-ng |
Chkrootkit |
Nload |
Airsnort |
Aide |
ntop |
Kismet |
Pads |
Trafshow |
Weplab |
Cowpatty |
Wavemon |
Because of the length of reason. Only a subset of the tools are listed here. The tools required for penetration testing can be found in a variety of Linux operating systems and then manually installed. Because of the complexity of the tools, the installation of these tools will become a vast project.
In order to facilitate the penetration of users to work, some people will all the tools are preinstalled in a Linux system. Of A typical operating system is the Kali Linux used in this book.
The system is mainly used for penetrant testing. It comes preloaded with a number of penetration testing software, including the Nmapport scanner, Wireshark (Packet Analyzer), and John the Ripper (password hack). and Aircrack-ng (a set of software for penetration testing of wireless LANs).
Users can perform Kali Linux with hard drives, live CDs, or Live USB.
Original address:www.daxueba.net
Kali Linux Security Penetration Tutorial < third more >1.2 safety penetration tools Required