Datasheet
21
Chapter 1: Introduction to Ethical Hacking
✓ SuperScan
✓ QualysGuard
✓ WebInspect
✓ Proactive Password Auditor
✓ Metasploit
✓ LANguard
✓ AirMagnet WiFi Analyzer
I discuss these tools and many others in Parts II through V when I go into the
specific hack attacks. Appendix A contains a more comprehensive listing of
these tools for your reference.
The capabilities of many security and hacking tools are often misunderstood.
This misunderstanding has cast a negative light on otherwise excellent and
legitimate tools.
Some of these security testing tools are complex. Whichever tools you use,
familiarize yourself with them before you start using them. Here are ways to
do that:
✓ Read the readme and/or online help files and FAQs.
✓ Study the user’s guides.
✓ Use the tools in a lab or test environment.
✓ Consider formal classroom training from the security tool vendor or
another third-party training provider, if available.
Look for these characteristics in tools for ethical hacking:
✓ Adequate documentation
✓ Detailed reports on the discovered vulnerabilities, including how they
might be exploited and fixed
✓ General industry acceptance
✓ Availability of updates and support
✓ High-level reports that can be presented to managers or nontechnical
types
These features can save you a ton of time and effort when you’re performing
your tests and writing your final reports.










