Chapter 7

Scanner scripting

Information in this chapter:

In this chapter, we will discuss how we can use and customize a few of the more popular scanning tools commonly found in penetration testing environments. Once again, we’ll be using the BackTrack 5 Linux security distribution, and everything we’ll be talking about will either already be found there or can easily be installed.

Although scanning tools are often useful in and of themselves, Nmap being an excellent example, we can often do considerably more with them if we are willing to devote the time and resources to learning how we can customize them. Many such tools provide us with the facility to customize or add to their ...

Get Coding for Penetration Testers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.