- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 187字
- 2021-07-02 23:30:50
Hacker tools
There are a range of many different hacking tools. A tool such as Nmap, for example, is a great tool for both reconnaissance and scanning for network vulnerabilities. Some tools are grouped together to make toolkits and frameworks, such as the Social Engineering Toolkit and Metasploit framework.
The Metasploit framework is one of the most versatile and best supported hacking tool frameworks available. Metasploit is built around a collection of highly effective modules, such as msfvenom, and it provides access to an extensive database of exploits and vulnerabilities. There are also physical hacking tools. Devices such as the Rubber Ducky and Wi-Fi Pineapple are good examples. The Rubber Ducky is a USB payload injector that automatically injects a malicious virus into the device it's plugged into.
The Wi-Fi Pineapple can act as a rogue router and it can be used to launch man-in-the-middle attacks. The Wi-Fi Pineapple also has a range of modules that allow it to execute multiple attack vectors. These types of tool are known as penetration testing equipment. We will explore these tools and others in more detail, later in the book.
- 工業(yè)互聯(lián)網(wǎng)安全
- 為你護航:網(wǎng)絡空間安全科普讀本(第2版)
- 黑客攻防技巧
- 安全技術運營:方法與實踐
- API攻防:Web API安全指南
- Spring Security(Third Edition)
- 安全防御入門手冊
- 情報驅動應急響應
- 先進云安全研究與實踐
- 網(wǎng)絡用戶行為的安全可信分析與控制
- 博弈論與數(shù)據(jù)安全
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網(wǎng)絡服務安全與監(jiān)控
- 網(wǎng)絡安全實戰(zhàn)詳解(企業(yè)專供版)
- 網(wǎng)絡空間安全:拒絕服務攻擊檢測與防御