Problem solve Get help with specific problems with your technologies, process and projects.

Network penetration testing: Ethical hacking tools and techniques

Value-added resellers (VARs) and security consultants learn about the ethical hacking tools and techniques they need to run an efficient network penetration test, including information gathering, port and vulnerability scanning, and password cracking.

This is the third installment of a six-part penetration testing tutorial for consultants and value-added resellers...

(VARs). In this part we take a look at ethical hacking tools for penetration testing and Web password crackers. I list the tools in order of how they're most commonly employed, keeping in mind the tests are not always performed in this order.


    Ethical hacking tools and techniques 

About the author:
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is The CISSP and CAP Prep Guide, published by John S. Wiley and Sons. He is available to answer your security threat questions via Ask the Expert.


 

This was last published in July 2007

Dig Deeper on Cybersecurity risk assessment and management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close