Chapter 3
Gathering Your Tools
IN THIS CHAPTER
Learning how to build your toolkit
Scanning hosts on your network with Nessus
Capturing and analyzing network data with Wireshark
Conducting pen testing, vulnerability scanning, and forensics with Kali Linux
Looking for hosts and services on a computer network with Nmap
As a pen tester, you need a set of tools that allows you to conduct assessments, scans, and tests of networks, systems, and all the devices connected to them. These tools give you the ability to test your network, systems, hosts, and devices and assess their securability.
The point is to make sure that you find the problems in your security before the hackers do. By running assessments, you can analyze the issues, assess the risks, and close them up — or at least monitor them. The best way to do this is to have a set of tools that allows you to conduct pen tests. In this chapter, I cover the most used tools and get you up and running like a pro!
Considerations for Your ...
Get Penetration Testing For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.