After understanding the concept of penetrant testing. The next step is to learn the various tools used in penetrant testing. Before doing the penetrant test. You need to understand the tools needed to penetrate the first. The tools required to penetrate the test are as shown in table 1-1:
Table 1-1 Tools required for penetration
Splint |
Unhide |
Scrub |
Pscan |
Examiner |
Ht |
Flawfinder |
Srm |
Driftnet |
Rats |
Nwipe |
Binwalk |
Ddrescue |
Firstaidkit-gui |
Scalpel |
GParted |
Xmount |
Pdfcrack |
TestDisk |
Dc3dd |
Wipe |
Foremost |
Afftools |
Safecopy |
Sectool-gui |
Scanmem |
Hfsutils |
Unhide |
Sleuthkit |
Cmospwd |
Examiner |
Macchanger |
Secuirty-menus |
Srm |
Ngrep |
Nc6 |
Nwipe |
ntfs-3g |
Mc |
Firstaidkit-gui |
Ntfsprogs |
Screen |
Net-snmp |
Pcapdiff |
Openvas-scanner |
HexEdit |
Netsed |
Rkhunter |
Irssi |
Dnstop |
LaBrea |
PowerTOP |
SSLstrip |
Nebula |
Mutt |
Bonesi |
Tripwire |
Nano |
Proxychains |
Prelude-lml |
vim-enhanced |
Prewikka |
Iftop |
Wget |
Prelude-manager |
Scamper |
Yum-utils |
Picviz-gui |
Iptraf-ng |
Mcabber |
Telnet |
Iperf |
Firstaidkit-plugin-all |
Onenssh |
Nethogs |
Vnstat |
Dnstracer |
Uperf |
Aircrack-ng |
Chkrootkit |
Nload |
Airsnort |
Aide |
ntop |
Kismet |
Pads |
Trafshow |
Weplab |
Cowpatty |
Wavemon |
Because of the length of reason. Only a subset of the tools are listed here. The tools required for penetration testing can be found in a variety of Linux operating systems and then manually installed. These tools are required for installation because of the complexity of the tools. will become a vast project.
In order to facilitate the penetration of users to work, some people will all the tools are preinstalled in a Linux system. Among them, the typical operating system. Is the Kali Linux used in this book.
The system is mainly used for penetrant testing.
It comes preloaded with a number of penetration testing software, including the Nmapport scanner, Wireshark (Packet Analyzer), and John the Ripper (password hack). and Aircrack-ng (a set of software for penetration testing of wireless LANs). Users can perform Kali Linux with hard drives, live CDs, or Live USB.
Original address:www.daxueba.net
Kali Linux Security Penetration Tutorial < third more >1.2 safety penetration tools Required