Pentester Tools to Know & ...
    14 July 21

    Pentester Tools to Know & When To Use Them: Part 2

    Posted byINE

    In our last blog post, we identified the first three tools Pentesters need to know, which include various social media platforms for information gathering as well as Nmap and FPing for host / port scanning. In part two, we will continue to take a look at a few other key tools needed and when they should be used.

    Vulnerability Assessment
    The Vulnerability Assessment phase is aimed at building a list of all vulnerabilities present on a target system. In this phase, you will have to carry out a vulnerability assessment for each and every target found in the previous step. You can complete a vulnerability assessment both manually or via automated tools.

    Keep in mind, the purpose of a penetration test is to mimic the effects of a black hat hacker, which means you have to learn how to think like a cyber criminal. You have to understand your client’s infrastructure and the vulnerabilities that it presents in order to know exactly how to take advantage of them.

    Tools used for performing vulnerability assessments:

    • Nessus
    • OpenVAS
    • Nexpose
    • GFI LAN Guard

    In the Exploitation phase, you will have to verify if all vulnerabilities really exist by exploiting all vulnerabilities found during your vulnerability assessment phase.

    A penetration test is a cyclical process, only ending when there are no more systems and services, in scope, to exploit.

    Remember: The goal of a penetration test is not to get root, it’s to find any and all vulnerabilities.

    Tools used for exploiting vulnerabilities:

    • Netcat
    • SQLMap
    • John The Ripper
    • Ophcrack
    • Hydra
    • Metasploit

    The Reporting phase is as important as the entire penetration test itself because it is your way to officially deliver and communicate your results with executives, IT staff, development teams, and other stakeholders.

    Tools used for reporting:

    • Microsoft Suite
    • eLearnSecurity's Pentest Reporting Guide

    More often than not, work done as a Pentester will be judged based on the quality of your report. Strong writing and presentation skills come in handy when reporting your findings. A complete pentest report must address the following key points:

    • Techniques used
    • Vulnerabilities found and exploited
    • Exploits used
    • Impact and risk analysis (for each vulnerability)
    • Remediation tips

    Want to be a Penetration Tester?
    The INE Penetration Testing Professional Learning Path helps build strong foundations by giving theoretical lessons reinforced with practical exercises, covering topics such as system, network, web app, and wi-fi security.

    Hey! Don’t miss anything - subscribe to our newsletter!

    © 2022 INE. All Rights Reserved. All logos, trademarks and registered trademarks are the property of their respective owners.
    instagram Logofacebook Logotwitter Logolinkedin Logoyoutube Logo