Page 187 - Hands-On Bug Hunting for Penetration Testers
P. 187

1 11




                                                                  Other Tools






            Throughout this book, we've touched on tooling and workflows that have been chosen
            based on a combination of efficiency, cost, professional opinion, and personal preference.
            But there are a profusion of security tools that you can leverage beyond the short list we've
            covered in our walkthrough.

            This chapter will cover both how to evaluate adopting new tools, as well as providing a
            simple overview of other useful Curate software, sites, communities, and educational
            resources. We'll cover everything from programs, such as scanners and Burp extensions, to
            crowd-sourced databases of attack snippets, such as SecLists.

            The following topics will be covered in this chapter:
                      Evaluating new tools
                      Paid versus free editions
                      A quick overview of Nikto, Kali, Burp extensions, and more



            Technical Requirements

            This chapter has a grab-bag of technical dependencies depending on what tools you
            actually want to incorporate into your workflow. Most of our CLI programs can be easily
            installed with the IPNFCSFX package manager; Burp Suite still requires its Java 8
            installation; and, of course, the Kali Linux distribution operates at a different level of the
            stack, since an OS requires a hard drive partition to install to. As ever, we'll be using
            Chrome (             ).
   182   183   184   185   186   187   188   189   190   191   192