Tools for Pentration Testing

I have been fortunate to have had time to pursue a couple of information technology certifications recently.  I have added CompTIA’s Network+ and CASP (Certified Advanced Security Professional), and I am working on the brand new CompTIA Pentest+.  The certification is so new there are no text books yet, and the exam was just released on July 31.  I have been taking the classes online through the CompTIA Instructor Network.

One of the challenges of learning penetration testing has always been finding a safe and legal place to practice using the tools.  Penetration testing without permission can get you into trouble with law enforcement.  You do not want to practice on your production network.  Penetration testing is an invasive and potentially destructive activity, and pentesting on a production network, even with permission, can cause problems.   Your options are:  creating a practice lab on your own, or purchasing time on a commercial practice lab.  Our instructor, T. Lee McWhorter, created a portable practice lab that each of us was able to set up on our own computer, using VirtualBox and GNS3.  GNS3 is a virtual network simulator that allows you to create networks of almost any size, and populate it with virtual devices such as routers and switches, and various virtual PCs and servers.

Of course a couple of the VMs are running Kali Linux, one at the command line and one with a GUI.  The Kali distro contains hundreds of tools a pen-tester can use.  Once your practice network is set up, you can attack your VMs with wild abandon.  Break a VM?  It is a trivial matter to replace it with a new copy.

The secret is to find the tools you like, and specialize and become expert on those programs.  Here is a list of tools that were recommended by the instructor.  These are tools that you would need to know in order to pass the PentTest+ certification, and are probably good for other certs such as the CEH (Certified Ethical Hacker) or OSCP (Offensive Security Certified Professional)

Virtual machine practice environment

  • VirtualBox, VMWare, Hyper-V
  • GNS3
  • Kali Linux

Information gathering

  • WHOIS
  • Maltego – OSINT
  • Nmap/Zenmap
  • Netcat (NC)
  • Ncat
  • arp-scan

Vulnerability analysis

  • Nmap
  • Nikto
  • OpenVAS

Web application and database analysis

  • Burp Suite
  • SQLmap
  • WPscan

Password attacks

  • Hydra – password cracking
  • John the Ripper
  • ophcrack-cli
  • mimikatz – pass the hash

Reverse engineering

  • WinDbg – debugging, reverse engineering

Exploitation

  • Metasploit
  • SET (Social Engineer Toolkit)

Sniffing and packet analysis

  • Hping
  • Wireshark (network sniffer)
  • tcpdump (network sniffer)
  • Aircrack-ng (wireless sniffing)

Reporting

  • Drydis CE – reporting
  • MagicTree – reporting

Most of these tools are found in the Kali Linux distro, but many are also available individually to download and install on Windows and Linux systems, too.  These are not the only tools available, but they may be the best or most frequently used tools.

This is not the first time I have written on this subject.  I have provided links to our earlier articles below.

More information:

 

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.