Kali Linux Security Penetration Tutorial < third more >1.2 safety penetration tools Required

Source: Internet
Author: User
Tags kali linux

After understanding the concept of penetrant testing. The next step is to learn the various tools used in penetrant testing. Before doing the penetrant test. You need to understand the tools needed to penetrate the first. The tools required to penetrate the test are as shown in table 1-1:

Table 1-1 Tools required for penetration

Splint

Unhide

Scrub

Pscan

Examiner

Ht

Flawfinder

Srm

Driftnet

Rats

Nwipe

Binwalk

Ddrescue

Firstaidkit-gui

Scalpel

GParted

Xmount

Pdfcrack

TestDisk

Dc3dd

Wipe

Foremost

Afftools

Safecopy

Sectool-gui

Scanmem

Hfsutils

Unhide

Sleuthkit

Cmospwd

Examiner

Macchanger

Secuirty-menus

Srm

Ngrep

Nc6

Nwipe

ntfs-3g

Mc

Firstaidkit-gui

Ntfsprogs

Screen

Net-snmp

Pcapdiff

Openvas-scanner

HexEdit

Netsed

Rkhunter

Irssi

Dnstop

LaBrea

PowerTOP

SSLstrip

Nebula

Mutt

Bonesi

Tripwire

Nano

Proxychains

Prelude-lml

vim-enhanced

Prewikka

Iftop

Wget

Prelude-manager

Scamper

Yum-utils

Picviz-gui

Iptraf-ng

Mcabber

Telnet

Iperf

Firstaidkit-plugin-all

Onenssh

Nethogs

Vnstat

Dnstracer

Uperf

Aircrack-ng

Chkrootkit

Nload

Airsnort

Aide

ntop

Kismet

Pads

Trafshow

Weplab

Cowpatty

Wavemon

Because of the length of reason. Only a subset of the tools are listed here. The tools required for penetration testing can be found in a variety of Linux operating systems and then manually installed. These tools are required for installation because of the complexity of the tools. will become a vast project.

In order to facilitate the penetration of users to work, some people will all the tools are preinstalled in a Linux system. Among them, the typical operating system. Is the Kali Linux used in this book.

The system is mainly used for penetrant testing.

It comes preloaded with a number of penetration testing software, including the Nmapport scanner, Wireshark (Packet Analyzer), and John the Ripper (password hack). and Aircrack-ng (a set of software for penetration testing of wireless LANs). Users can perform Kali Linux with hard drives, live CDs, or Live USB.

Original address:www.daxueba.net

Kali Linux Security Penetration Tutorial < third more >1.2 safety penetration tools Required

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.