Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vulnerability Scanning / Penetration Testing


  • Please log in to reply
1 reply to this topic

#1 CyberProtectionGroup

CyberProtectionGroup

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:29 PM

Posted 04 March 2015 - 09:27 PM

Not sure if there are any followers in this forum that do vulnerability scanning and penetration testing, but I thought it would be great to start a thread to list some of your favorite tools.  I'll start with this one.  If there were only one tool out there, I would want it to be NMAP.  By far, one of the most useful tools out there.

 



BC AdBot (Login to Remove)

 


#2 White Hat Mike

White Hat Mike

  • Members
  • 312 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:::1
  • Local time:08:29 PM

Posted 05 March 2015 - 12:23 AM

Not sure if there are any followers in this forum that do vulnerability scanning and penetration testing, but I thought it would be great to start a thread to list some of your favorite tools.  I'll start with this one.  If there were only one tool out there, I would want it to be NMAP.  By far, one of the most useful tools out there.

 

 

Kali Linux, Nmap, Nessus, Nexpose, QualysGuard, Metasploit, Yeti, Hydra, Medusa, John the Ripper, DirBuster

 

All are useful tools.  Then of course we have command-line utilities include in distros such as Kali, i.e. dig, whois, dnsrecon, netcat, etc.


Edited by White Hat Mike, 05 March 2015 - 12:23 AM.

Information Security Engineer | Penetration Tester | Forensic Analyst

CipherTechs.com





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users