O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Supplementary Tools

This appendix will present several additional tools that can be used as extra weapons while conducting the penetration testing process. For each tool we will describe:

  • The purpose of the tool
  • The tool installation process
  • Examples of the tool usage whenever possible

The tools mentioned are not installed by default in BackTrack. You need to install it by yourself from the BackTrack repository or from the the tools website.

We will loosely divide the tools into the following categories:

  • Vulnerability scanner
  • Web application fingerprinter
  • Network ballista tool

Let's see several additional tools we can use during our penetration testing process.

Vulnerability scanner

BackTrack by default comes with OpenVAS as the vulnerability ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required