Chapter 6. Exploring Hacking Toolkits
As you probably know, hackers and penetration testers use not only small standalone utilities in their work, but also (probably more often) various sets of security tools and whole OS distributions built for penetration testing and filled with necessary tools.
In the course of this chapter, we are going to review toolkits, frameworks, and distributions and provide examples of their utilization in our lab environment in order to familiarize you with them and help you choose the toolkits you would like to learn in more depth for your tasks.
In this chapter, we are going to cover the following topics:
- Wireless hacking tools
- Infrastructure hacking tools
- Cracking tools
- Web application hacking tools
Wireless hacking tools ...
Get Building a Pentesting Lab for Wireless Networks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.