O'Reilly logo

Conducting Network Penetration and Espionage in a Global Environment by Bruce Middleton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12

Order of Operations for Your Tools

During a penetration test you go through various phases. What are those phases and what tools should be used in what order in each of the phases? Of course this can vary somewhat depending on your skill level, the environment you are working in, the terms of the agreement with your client, the tools you have at your disposal, and so on, but in general, here are the phases and the tools to use in each phase. Not all tools are necessary in every phase, and other tools not listed could be used in place of those I list.

Reconnaissance

Remember that this step is essential—critical. Do not just jump in and begin using tools trying to hack into a system somewhere. That’s what impatient losers do (it’s also ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required