The Tools of the Trade

The classic methods of attempting to find vulnerabilities, assess them, and create reports based on them are just as effective today as they ever were. An experienced staff member might take inventory of the system, attempt to attack it, and manually create reports of the findings. Unfortunately, this methodology is not effective in doing a comprehensive and repeatable assessment due to the human factors involved (i.e., variations).

The tools used for this work are generally targeted at different areas. We'll attempt to sort them out here and identify their most effective uses. After all, you can use a screwdriver as a chisel in some cases, but it's not always the best way to get the job done.

Network-perspective scanning ...

Get Effective Incident Response Team, The now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.