Chapter 3

Gathering Your Tools

IN THIS CHAPTER

Bullet Learning how to build your toolkit

Bullet Scanning hosts on your network with Nessus

Bullet Capturing and analyzing network data with Wireshark

Bullet Conducting pen testing, vulnerability scanning, and forensics with Kali Linux

Bullet Looking for hosts and services on a computer network with Nmap

As a pen tester, you need a set of tools that allows you to conduct assessments, scans, and tests of networks, systems, and all the devices connected to them. These tools give you the ability to test your network, systems, hosts, and devices and assess their securability.

The point is to make sure that you find the problems in your security before the hackers do. By running assessments, you can analyze the issues, assess the risks, and close them up — or at least monitor them. The best way to do this is to have a set of tools that allows you to conduct pen tests. In this chapter, I cover the most used tools and get you up and running like a pro!

Considerations for Your ...

Get Penetration Testing For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.