Hacker Tools for Pen Testing

On Wednesday we took a look at a collection of mostly web-based reconnaissance tools.  Today we are taking it to the next level and actually attempting to find and exploit vulnerabilties.

Kali Linux – This is a pen-testers version of Linux that comes fully loaded with over a hundred testing applications.  Kali can be installed in any  old laptop you have laying around, installed as a virtual machine using VirtualBox or VMware, or as a bootable CD or USB flash drive.

OpenVAS – Professionals with a budget will use a tool such as Tenable’s Nessus.  OpenVAS is an open-source fork of the Tenable product, and is well documented and free to use.

Burp Suite – This tool can be used to run vulnerability assessments and security audits on web applications

Sqlmap – A great tool for finding SQL injection flaws and exploiting them to take over a database server.

WPScan – Find vulnerabilities in WordPress websites

Joomscan – Detect and analyze Joomla website security flaws.

If you are working in the cybersecurity field, these are some of the tools that can make your job easier.  If you are working towards getting into the cybersecurity field, knowing thiese tools will certainly help you land that first job.


About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.