• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

William Bailey

Ethical Hacking

MIS 5211.701 ■ Fall 2020 ■ William Bailey
  • Home
  • INSTRUCTOR
  • SYLLABUS
  • Gradebook

Week 05 – Open Source vs Commercial

September 26, 2020 by William Bailey 9 Comments

During this week, we talked about some additional scanning products used in Ethical Hacking.  While many are open source,  we also mentioned that there are some products that are commercial, and require a paid license.

During your trial of Kali, so far, have you found any interesting tools that you want to spend more time with?

While not disclosing your employer’s name, are you aware of tools that your employer currently uses?

 

Filed Under: Week 05: System and User Enumeration Tagged With:

Reader Interactions

Comments

  1. Kelly Sharadin says

    October 2, 2020 at 7:34 pm

    I thought Kali had Volatility pre-loaded but no evidence of that in the forensics tab. Commercial forensic tools are pretty pricey so I know my org’s forensic team develops their tool-kits to be open source and Volatility is a great open-source software for analyzing memory for malware and other IOCs. Looking through the ‘Post-Exploitation’ tab, I see Mimikatz comes pre-installed. We have had a couple instances in my environment where we have caught people from our division using Mimikatz which as you would expect raises A LOT of questions. Ultimately, we were able to confirm that those individuals did have permission to use Mimikatz in our network for testing. Although I am familiar with this tool, I have never personally used it so I may try it out on my own window VMs.

    Log in to Reply
  2. Zhuofu Wang says

    October 2, 2020 at 9:17 pm

    The Wireshark, which is a free and open-source network analysis tool to capture network, and it’s pre-loaded to the Kali Linux. It can be used to view network traffic, and it cannot be used for intrusion detection. So, we can use it with confidence and don’t have to worry about the wrong operation causing damage to the network. We can use Wireshark to monitor network traffic, analyze the captured packets, or use the captured packet for troubleshooting.

    Log in to Reply
  3. Nicholas Fabrizio says

    October 2, 2020 at 11:03 pm

    One of the pre-loaded tools on Kali I would like to test out is sqlmap, which deals with databases. This tool will find vulnerabilities such as sql injections and other ways to take over the database. Sqlmap supports many popular database management engines. I’m not aware if anyone at my organization uses this tool, but it would be helpful to test our databases for any vulnerabilities.

    Log in to Reply
  4. Anthony Wong says

    October 2, 2020 at 11:17 pm

    I would definitely like to learn how to use and understand how Wireshark works. This is one of tools my employer uses for IT operations support for Production issues and project troubleshooting. I have seen it in action before, but it would be a huge benefit for me to understand how it works and how to use it myself. Also, I know nmap is used and pretty sure dnstracer as well.

    Log in to Reply
    • Kelly Sharadin says

      October 3, 2020 at 5:58 pm

      Hi,

      If you’re interested in learning Wireshark I recommend checking this website out. https://unit42.paloaltonetworks.com/wireshark-tutorial-examining-trickbot-infections/ Helps to give you some examples of what to look for in your network and how to configure Wireshark to optimize your workflow.

      Log in to Reply
      • Bryan Garrahan says

        October 5, 2020 at 10:04 am

        I have used Wireshark during training in the past and it’s certainly a tool I feel is very useful and robust. Thank you for sharing this link, Kelly.

        Log in to Reply
  5. Bryan Garrahan says

    October 5, 2020 at 10:13 am

    Snort is a network traffic analysis tool that I have used in the past and would like to further into moving forward. I spoke with a member of my organizations security risk management team and he informed me that we have used both snort and wireshark in the past. Additionally, my coworker informed me that we use skipfish for web applications.

    Log in to Reply
    • Kelly Sharadin says

      October 5, 2020 at 5:09 pm

      never heard of skipfish – I’ll have to look into that

      Log in to Reply
  6. Humbert Amiani says

    October 5, 2020 at 5:04 pm

    The one tool I would like to explore a little more in Kali is ZenMAP, as I understand it is baically a GUI version of nMAP.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 01: Overview (5)
  • Week 02: TCP/IP and Network Architecture (3)
  • Week 03: Virtualization (2)
  • Week 04: Vulnerability Scanning (2)
  • Week 05: System and User Enumeration (2)
  • Week 06: Metasploit (1)
  • Week 07: Social Engineering (2)
  • Week 08: Malware (2)
  • Week 09: Web Application Security (1)
  • Week 12: Wireless (2)
  • Week 14: Review of all topics (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in