Network penetration testing: Ethical hacking tools and techniques
Value-added resellers (VARs) and security consultants learn about the ethical hacking tools and techniques they need to run an efficient network penetration test, including information gathering, port and vulnerability scanning, and password cracking.
This is the third installment of a six-part penetration testing tutorial for consultants and value-added resellers (VARs). In this part we take a look at ethical hacking tools for penetration testing and Web password crackers. I list the tools in order of how they're most commonly employed, keeping in mind the tests are not always performed in this order.
Ethical hacking tools and techniques
About the author:
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is The CISSP and CAP Prep Guide, published by John S. Wiley and Sons. He is available to answer your security threat questions via Ask the Expert.