By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
I'm not sure there is a definitive answer to the category question, but here are a few more you should consider: Footprinting -- These tools are mostly open source, such as domain queries via "whois" or "nslookup" and are primarily used to identify potential targets. Scanning -- These tools, such as "nmap" and "ncat" are used by an attacker to find open ports which potentially could be attacked. War Dialers -- These tools simply dial number after number, looking for modems. Rootkits -- These tools are what the so-called "script-kiddies" use to exploit known vulnerabilities. For a more complete discussion of this subject, I highly recommend Hacking Exposed, written by Stuart McClure, Joel Scambray and George Kurtz, published by Osborne. In it you will find a discussion of all of these types of tools, how they are used and a list of tools and where to find them. I'm reasonably certain that the second edition of this book was recently published.
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.