Barrio, James Zar E.
IT PRC 8 LAB
Prof. Alfred Paldez
Pen Testing Tools
Research 5 pen testing tools and briefly explain how they work.
1. Metasploit
- Metasploit is an open-source penetration testing framework used to identify, exploit, and validate
vulnerabilities. It provides a set of tools for simulating real-world attacks to test the security of systems.
Metasploit includes a library of exploits and payloads that can be used to test vulnerabilities in various
systems and applications.
2. Nmap
- Nmap (Network Mapper) is a powerful network scanning tool used to discover devices and services on
a network. It can identify open ports, detect operating systems, and find vulnerabilities in network
services. Nmap is widely used for network discovery and vulnerability detection.
3. Wireshark
- Wireshark is a network protocol analyzer that captures and inspects network traffic. It allows users to
analyze the data being transmitted over a network, helping to identify potential security issues, such as
unauthorized access or data exfiltration. Wireshark is useful for understanding network behavior and
detecting anomalies.
4. Burp Suite
- Burp Suite is an integrated platform for performing security testing of web applications. It includes tools
for mapping and analyzing the attack surface, intercepting and modifying HTTP requests, and identifying
vulnerabilities such as SQL injection and cross-site scripting (XSS). Burp Suite is widely used for web
application penetration testing.
5. Nessus
- Nessus is a vulnerability scanner that identifies security vulnerabilities, misconfigurations, and
compliance issues in systems and networks. It scans for known vulnerabilities and provides detailed
reports with recommendations for remediation. Nessus is used to assess the security posture of an
organization's IT infrastructure.