January 31, 2019 | by Marine D. | Blog posts

Discover the top 8 tools every ethical hacker should know how to use.
Tags: BurpSuite, Cain and Abel, ethical hacking, John The Ripper, metasploit, Nessus, nmap, penetration testing, Penetration Testing Extreme (PTX), Penetration Testing Professional (PTP), Powershell, Wireshark
Read more
June 16, 2012 | by francesco | Blog posts
Tools: Nessus, Metasploit, Nmap, proxychains.
Attention: In our tests proxychains works only on 32 bit Backtrack 5
One of the best features that Metasploit offers is the ability of “pivoting”. With this technique, an attacker can use a compromised machine as a “pivot” to attack other machines in the same or in other networks that the compromised host can reach.
Tags: metasploit, Nessus, network security, nmap, pivoting
Read more