IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Penetration Testing Tools and Techniques

Penetration Testing Tools and Techniques
View Sample PDF
Author(s): Abhijeet Kumar (Independent Researcher, India)
Copyright: 2023
Pages: 27
Source title: Perspectives on Ethical Hacking and Penetration Testing
Source Author(s)/Editor(s): Keshav Kaushik (University of Petroleum and Energy Studies, India)and Akashdeep Bhardwaj (University of Petroleum and Energy Studies, India)
DOI: 10.4018/978-1-6684-8218-6.ch012

Purchase

View Penetration Testing Tools and Techniques on the publisher's website for pricing and purchasing information.

Abstract

Penetration testing is an ever-growing field that deals with a lot of products and services. This chapter will begin introduction of networking, Linux, and Bash. Furthermore, the common tools of the trade (Nmap, Nessus, Metasploit, Burp suite, etc.) for specific type of penetration testing assessments. Readers are recommended to do their own research on such topics in order to gain more in-depth knowledge. Links to additional reading materials will be added in the reference section at the end of the chapter. Readers are advised to go through them at least once to learn more comprehensive information about some chapter topics.

Related Content

Amdy Diene. © 2024. 12 pages.
B. Sam Paul, A. Anuradha. © 2024. 21 pages.
Muhsina, Zidan Kachhi. © 2024. 15 pages.
Burak Tomak, Ayşe Yılmaz Virlan. © 2024. 14 pages.
Allen Farina, Carolyn N. Stevenson. © 2024. 25 pages.
Sadhana Mishra. © 2024. 16 pages.
Catherine Hayes. © 2024. 17 pages.
Body Bottom