Chapter 3

Gathering Your Tools

IN THIS CHAPTER

Bullet Learning how to build your toolkit

Bullet Scanning hosts on your network with Nessus

Bullet Capturing and analyzing network data with Wireshark

Bullet Conducting pen testing, vulnerability scanning, and forensics with Kali Linux

Bullet Looking for hosts and services on a computer network with Nmap

As a pen tester, you need a set of tools that allows you to conduct assessments, scans, and tests of networks, systems, and all the devices connected to them. These tools give you the ability to test your network, systems, hosts, and devices and assess their securability.

The point is to make sure that you find the problems in your security before the hackers do. By running assessments, you can analyze the issues, assess the risks, and close them up — or at least monitor them. The best way to do this is to have a set of tools that allows you to conduct pen tests. In this chapter, I cover the most used tools and get you up and running like a pro!

Considerations for Your ...

Get Penetration Testing For Dummies now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.