Appendix A. Supplementary Tools
This chapter will briefly describe several additional tools that can be used as extra weapons while conducting the penetration testing process. For each tool, we will describe the following aspects:
- The tool function
- The tool installation process if the tool is not included in Kali Linux
- Some examples on how to use the tool
The tools described in this chapter may not be included by default in Kali Linux. You need to download them from the Kali Linux repository as defined in the
/etc/apt/sources.lst file using the
apt-get command, or you can download them from each tool's website.
We will loosely divide the tools into the following categories:
- The reconnaissance tool
- The vulnerability scanner
- Web application tools
- The network ...