Skip to main content

Exploiting Vulnerabilities

  • Chapter
  • First Online:
From Hacking to Report Writing
  • 3740 Accesses

Abstract

What makes an excellent carpenter? The most obvious answer would, of course, be excellent craftsmanship. But without the right tools, not even the world’s greatest carpenter could make a decent table. The same is true for a security tester; she needs the right tools to carry out a decent security test. These tools are, most of the time, the very same tools that a hacker would use to try to force her way into a system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.wired.com/2012/01/computer-password/

  2. 2.

    https://www.thc.org/thc-hydra/

  3. 3.

    http://splashdata.blogspot.de/2014/01/worst-passwords-of-2013-our-annual-list.html

  4. 4.

    https://github.com/robertsvensson/Rothko

  5. 5.

    http://foofus.net/goons/jmk/medusa/medusa.html

  6. 6.

    https://hashcat.net/hashcat/

  7. 7.

    http://www.openbsd.org/papers/bcrypt-paper.pdf

  8. 8.

    http://project-rainbowcrack.com/buy.php

  9. 9.

    https://www.owasp.org/index.php/Top_10_2013

  10. 10.

    http://getfirebug.com/whatisfirebug

  11. 11.

    https://github.com/robertsvensson/FolderBoulder

  12. 12.

    https://www.grc.com/nat/arp.htm

  13. 13.

    https://httpd.apache.org/docs/2.4/misc/password_encryptions.html

  14. 14.

    http://hashcat.net/oclhashcat/

  15. 15.

    http://www.dvwa.co.uk/

  16. 16.

    https://github.com/google/firing-range

  17. 17.

    https://hackerone.com/

  18. 18.

    https://www.vmware.com/products/player/

  19. 19.

    https://www.virtualbox.org/

  20. 20.

    http://www.linux-kvm.org/

  21. 21.

    http://www.darkreading.com/attacks-breaches/adobe-hacker-says-he-used-sql-injection-to-grab-database-of-150000-user-accounts/d/d-id/1138677

  22. 22.

    https://portswigger.net/

  23. 23.

    http://w3techs.com/technologies/overview/programming_language/all

  24. 24.

    https://www.owasp.org/index.php/Testing_for_SQL_Injection_(OTG-INPVAL-005 )

  25. 25.

    https://subgraph.com/vega/

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Robert Svensson

About this chapter

Cite this chapter

Svensson, R. (2016). Exploiting Vulnerabilities. In: From Hacking to Report Writing. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2283-6_7

Download citation

Publish with us

Policies and ethics