Summary

This chapter describes several additional tools that can be used for the job of penetration testing. Those tools may not be included in Kali Linux or you might need to get the newer version; you can get and install them easily, as explained in this chapter. There are four tools described in this chapter. They are reconnaissance tool, vulnerability scanner, web application tools, and network tool.

These tools were selected on the basis of their usefulness, popularity, and maturity.

We started off by describing the tools, how to install and configure them, and later on moved to describing their usage.

The next appendix will talk about several useful resources that can be used as references during penetration testing.

Get Kali Linux – Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.