Penetration Testing mailing list archives

RE: Tools to use for Penetration Testing?


From: "Shenk, Jerry A" <jshenk () decommunications com>
Date: Sat, 13 Sep 2008 13:51:05 -0400

Most tools from 2004 will still work...some links might be a problem but
the tools work.  Don't get too excited about a "wasting time" on old
tools.  There are still a LOT of old holes.  You need the new stuff too
but you'd better catch the old stuff.

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Chip Panarchy
Sent: Wednesday, September 10, 2008 9:50 PM
To: eufrato () gmail com; peter () pbstewart info
Cc: pen-test () securityfocus com
Subject: Re: Tools to use for Penetration Testing?

Thanks for all the listings guys.

I will try them out. Also, I have been on sectools many times in the
past... but it truly is a very large list... and not all the tools are
still good (since 2004 or whenever it was last updated)

Please continue to recommend to me programs.

Thanks

Panarchy

On Thu, Sep 11, 2008 at 11:40 AM, hasran addahroni <eufrato () gmail com>
wrote:
Hi chip,

there are many tools that you can use.you can use scanner like Nessus,
acunetix, core impac, etc and you can use also proxy tools like
pharos,
webscarab,burpsite,etc

regards


On Wed, Sep 10, 2008 at 11:57 AM, Chip Panarchy
<forumanarchy () gmail com>
wrote:

Hello

I am interested in getting started as a white hat hacker/pen tester.

I would like to know what tools I should get familiar with, and be
able to use to be a pen-tester.

I only know of a few at the moment, and of them, I only use 2 (NMap
and Wireshark).

Can I please receive recommendations on tools to use?

Thanks in advance,

Chip Panarchy

PS: I am currently in training towards my CCNA and (maybe) MCSE.


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar

------------------------------------------------------------------------




--
Half of what I say is meaningless, but I say it so that the other half
may
reach you
(Kahlil Gibran, "sand and foam", 1926)


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


**DISCLAIMER
This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which 
they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the 
intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the 
message. If you have received this communication in error, please notify the sender and delete this e-mail message. The 
contents do not represent the opinion of D&E except to the extent that it relates to their official business.

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


Current thread: