Problem solve Get help with specific problems with your technologies, process and projects.

Network penetration testing: Ethical hacking tools and techniques

Value-added resellers (VARs) and security consultants learn about the ethical hacking tools and techniques they need to run an efficient network penetration test, including information gathering, port and vulnerability scanning, and password cracking.

This is the third installment of a six-part penetration testing tutorial for consultants and value-added resellers...

(VARs). In this part we take a look at ethical hacking tools for penetration testing and Web password crackers. I list the tools in order of how they're most commonly employed, keeping in mind the tests are not always performed in this order.

    Ethical hacking tools and techniques 

About the author:
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is The CISSP and CAP Prep Guide, published by John S. Wiley and Sons. He is available to answer your security threat questions via Ask the Expert.


This was last published in July 2007

Dig Deeper on Threat management and prevention



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.