ETHICAL HACKER AND PENETRATION TEST TOOLS
Tural Yunusov
Institute of Information Technology of ANAS, Baku, Azerbaijan
turaly@mail.ru
Abstracts –
The article covers the security of computer networks,
cyber attack methods, cyber attack vectors, hackers, hacker types and
goals, ethical hackers, ethical hacking skills, Kali Linux operating
system, pentesting tools - websploit, nmap, webspoit, penetration test
methodology, practically penetration test on the network.
Keywords –
security assessment, ethical hacker, CEH, Kali Linux,
Nikto, Nmap, webspoit, test methodology, OWASP, OSSTMM,
ISSAF.