Appendix A. Supplementary Tools
This chapter will briefly describe several additional tools that can be used as extra weapons while conducting the penetration testing process. For each tool, we will describe the following aspects:
- The tool's function
- The tool's installation process if the tool is not included in Kali Linux
- Some examples of how to use the tool
The tools described in this chapter may not be included by default in a Kali Linux rolling distribution. You need to download them from the Kali Linux repository as defined in the /etc/apt/sources.lst
file, using the apt-get
command, or you can download them from each tool's website.
We will loosely divide the tools into the following categories:
- The reconnaissance tool
- The vulnerability scanner
- Web application tools
- The network tool
Let's look at several additional tools that we can use during our penetration testing process.