enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Kali Linux - Wikipedia

    en.wikipedia.org/wiki/Kali_Linux

    Kali Linux has approximately 600 [7] penetration-testing programs (tools), including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), metasploit (penetration testing framework), John the Ripper (a password cracker), sqlmap (automatic SQL injection and database takeover tool), Aircrack-ng ...

  3. List of digital forensics tools - Wikipedia

    en.wikipedia.org/.../List_of_digital_forensics_tools

    Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing, formerly known as BackTrack. [2] Parrot Security OS is a cloud-oriented Linux distribution based on Debian and designed to perform security and penetration tests, do forensic analysis, or act in anonymity. It uses the MATE Desktop ...

  4. List of security assessment tools - Wikipedia

    en.wikipedia.org/wiki/List_of_security...

    Kali Linux (formerly BackTrack), a penetration-test-focused Linux distribution based on Debian; Pentoo, a penetration-test-focused Linux distribution based on Gentoo; ParrotOS, a Linux distro focused on penetration testing, forensics, and online anonymity.

  5. Offensive Security Certified Professional - Wikipedia

    en.wikipedia.org/wiki/Offensive_Security...

    Offensive Security Certified Professional (OSCP, also known as OffSec Certified Professional) is an ethical hacking certification offered by Offensive Security (or OffSec) that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution (successor of BackTrack). [1]

  6. Hydra (software) - Wikipedia

    en.wikipedia.org/wiki/Hydra_(software)

    Hydra (or THC Hydra) is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. [2] It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.

  7. Penetration test - Wikipedia

    en.wikipedia.org/wiki/Penetration_test

    Many other specialized operating systems facilitate penetration testing—each more or less dedicated to a specific field of penetration testing. A number of Linux distributions include known OS and application vulnerabilities, and can be deployed as targets to practice against. Such systems help new security professionals try the latest ...

  8. BlackArch - Wikipedia

    en.wikipedia.org/wiki/BlackArch

    BlackArch is a penetration testing distribution based on Arch Linux that provides a large number ... Similar to Kali Linux and Parrot ... Uncategorized tools: 3 tools ...

  9. Metasploit - Wikipedia

    en.wikipedia.org/wiki/Metasploit

    Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl.By 2007, the Metasploit Framework had been completely rewritten in Ruby.On October 21, 2009, the Metasploit Project announced [4] that it had been acquired by Rapid7, a security company that provides unified vulnerability management solutions.