Appendix E

Security Testing Tools

A list of common security testing tools is discussed in this section. This is by no means an all-inclusive list of security tools, and the tools that are applicable to your organizational requirements need to be identified and used accordingly.

E.1 Reconnaissance (Information Gathering) Tools

  • Ping: By sending Internet control message protocol (ICMP) echo request packets to a target host and waiting for an ICMP response, the network administration utility Ping can be used to test whether a particular host is reachable across an Internet Protocol (IP) network. It can also be used to measure the round-trip time for packets sent from the local host to a destination computer, including the local host’s own interfaces. ...

Get Official (ISC)2 Guide to the CSSLP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.