O'Reilly logo

Cyber Warfare by Steve Winterfeld, Jason Andress

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Logical Weapons
A variety of tools are available for use in cyber warfare, penetration testing, and security in general. And most of them are free (or have free versions) and are available to the general public. For instance, reconnaissance tools can gather general information, search whois and DNS records, and search metadata from media and documents. Scanning tools, such as Nmap and Nessus, can find systems and detect areas where vulnerabilities might exist. Access and privilege escalation tools, such as Metasploit and CANVAS, can penetrate system accounts. Exfiltration tools ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required