This is the third installment of a six-part penetration testing tutorial for consultants and value-added resellers (VARs). In this part we take a look at ethical hacking tools for penetration testing and Web password crackers. I list the tools in order of how they're most commonly employed, keeping in mind the tests are not always performed in this order.
Ethical hacking tools and techniques
About the author:
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is The CISSP and CAP Prep Guide, published by John S. Wiley and Sons. He is available to answer your security threat questions via Ask the Expert.