19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1: Introduction to Ethical Hacking<br />

because you use the right tools doesn’t mean that you’ll discover all the right<br />

vulnerabilities. Experience counts.<br />

Know the personal and technical limitations. Many vulnerability scanners<br />

generate false positives and negatives (incorrectly identifying vulnerabilities).<br />

Others just skip right over vulnerabilities altogether. In certain situations, like<br />

when testing web applications, you might need to run multiple vulnerability<br />

scanners to find the most vulnerabilities.<br />

Many tools focus on specific tests, and no tool can test for everything. For<br />

the same reason that you wouldn’t drive a nail with a screwdriver, don’t<br />

use a port scanner to uncover specific network vulnerabilities. This is why<br />

you need a set of specific tools for the task. The more (and better) tools you<br />

have, the easier your ethical hacking efforts are.<br />

Make sure you’re using the right tool for the task:<br />

✓ To crack passwords, you need cracking tools, such as ophcrack and<br />

Proactive Password Auditor.<br />

✓ For an in-depth analysis of a web application, a web vulnerability scanner<br />

(such as Acunetix Web Vulnerability Scanner or NTOSpider) is more<br />

appropriate than a network analyzer (such as Wireshark).<br />

When selecting the right security tool for the task, ask around. Get advice<br />

from your colleagues and from other people online via Google, LinkedIn (www.<br />

linkedin.com), and Twitter (http://twitter.com). Hundreds, if not thousands,<br />

of tools can be used for ethical hacking. The following list runs down<br />

some of my favorite commercial, freeware, and open source security tools:<br />

✓ Cain & Abel<br />

✓ OmniPeek<br />

✓ QualysGuard<br />

✓ WebInspect<br />

✓ ophcrack<br />

✓ Metasploit<br />

✓ GFI LanGuard<br />

✓ CommView for WiFi<br />

I discuss these tools and many others in Parts II through V when I go into the<br />

specific hack attacks. The Appendix contains a more comprehensive listing<br />

of these tools for your reference.<br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!