Recommended Pen Testing Tools

11186

– Describes some of the commonly used penetration testing tools such as NMAP, Metasploit, the Pwn Plug, and Wireshark.

ShowCover

Links:

– Pwn Plug R3

https://www.pwnieexpress.com/product/pwn-plug-r3penetration-testing-device/

– Linksys WRT54G router:

http://www.amazon.com/gp/product/B00008DOYO/ref=as_li_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=B00008DOYO&linkCode=as2&tag=davlprostecbl-20&linkId=P4JVIFFPZ4ESX2HZ

– Nmap:

http://nmap.org/

– Nmap Network Scanning book:

http://www.amazon.com/gp/product/0979958717/ref=as_li_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=0979958717&linkCode=as2&tag=davlprostecbl-20&linkId=GZR7ONAN5K6P7WVE

– Metasploit:

http://www.metasploit.com/

– Metasploit the Penetration Tester’s Guide:

http://www.amazon.com/gp/product/159327288X/ref=as_li_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=159327288X&linkCode=as2&tag=davlprostecbl-20&linkId=B2KGCCJ2HMMOMLHV

– Mastering Metasploit:

http://www.amazon.com/gp/product/1782162224/ref=as_li_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=1782162224&linkCode=as2&tag=davlprostecbl-20&linkId=BWONKALGJJJUC2D3

– Nessus:

http://www.tenable.com/products/nessus

– Wireshark:

https://www.wireshark.org/

– Microsoft Network Monitor:

http://www.microsoft.com/en-us/download/details.aspx?id=4865

– Microsoft Message Analyzer:

http://www.microsoft.com/en-us/download/details.aspx?id=44226

– Kismet:

https://www.kismetwireless.net/download.shtml

– Aircrack:

http://www.aircrack-ng.org/

– John the Ripper:

http://www.openwall.com/john/

– Cain & Abel:

http://www.oxid.it/cain.html

– RainbowCrack:

http://project-rainbowcrack.com/

– Knoppix:

http://www.knopper.net/knoppix/index-en.html

– Network Security Toolkit:

http://www.networksecuritytoolkit.org/nst/index.html

– Ruby:

https://www.ruby-lang.org/en/

– PHP:

http://php.net/

– Security+ Certification:

http://www.sy0-401.com

http://certification.comptia.org/getCertified/certifications/security.aspx

– Certified Ethical Hacker (CEH):

http://www.eccouncil.org/Certification/certified-ethical-hacker

– Cisco Cybersecurity Specialist (SCYBER):

http://www.cisco.com/web/learning/certifications/specialist/security/sec_cyberSec.html

– Check Point Certification:

http://www.checkpoint.com/support-services/training-certification/