Using Network Security Tools, Scripts, and Code
In the previous chapters, we learned about network and security protocols. In this chapter, we will provide a comprehensive overview of the various security tools that we will work with later in this book. We will start by describing the main open source and commercial tools. Then, we will look at tools that are used to gather information on our target network (which can be a network that we want to protect), followed by tools for discovering vulnerabilities and network weaknesses.
In this chapter, we're going to cover the following main topics:
- Commercial, open source, and Linux-based tools
- Information gathering and packet analysis tools
- Network analysis and management tools
- Vulnerability analysis tools
- Exploitation tools
- Stress testing tools
- Network forensics tools
Some tools fulfill tasks in several categories, such as when a tool can be used both as a vulnerability tool and for exploitation...