Is it dangerous to install hacking tools on my private linux machine?Are there any hardware diagnostic tools?How to install vmware tools?How do I install development tools for 12.10?Install python setup tools for Ubuntu 12.04Kali Linux tools on Ubuntu 15.04Is it possible to install sketch and zeplin in Ubuntu?
What plausible reasons why people forget they didn't originally live on this new planet?
The use of SlotSequence in If[#1 > #2, ##] &
Truth table generator for an arbitrary function
Given a Fibonacci number , find the next Fibonacci number
What do you do when brand new pads are rubbing on new rotor? It smokes and smells so bad and it seems like it is going to catch on fire
Can Chill Touch prevent Regeneration?
Does using an img title attribute in addition to the alt attribute help image SEO?
Why apt asking to uninstall GIMP when installing ardour?
Replacing each letter with the letter that is in the corresponding position from the end of the English alphabet
Do I need a visa for Japan as a New Zealand Citizen?
Repeating Numbered Items in Beamer
Heat-shrink tubing available as a roll like adhesive tape?
How was the space shuttle fuelled?
In this scene from the novel, 'The Martian', by Andy Weir, how does Mark Watney store hydrogen made from water in the tank?
What does "away to insignificance" mean?
PUTTY - Most insecure SSH client?
As a vegetarian, how can I deal with microwaves smelling of meat and fish?
Is there a minimal approach speed for airliners during rush hour?
What is an idiom, phrase or expression for situation such as "throw a pigeon among cats"
What are the advantages to banks being located in the City of London (the Square Mile)?
Why doesn't the nucleus have "nucleus-probability cloud"?
What can I wear to avoid getting frisked and crotch searched by TSA at the airport?
Visualize a large int
Compress .hex file for micro-controller
Is it dangerous to install hacking tools on my private linux machine?
Are there any hardware diagnostic tools?How to install vmware tools?How do I install development tools for 12.10?Install python setup tools for Ubuntu 12.04Kali Linux tools on Ubuntu 15.04Is it possible to install sketch and zeplin in Ubuntu?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty
margin-bottom:0;
I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?
command-line software-installation tools hacking kali-linux-tools
add a comment
|
I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?
command-line software-installation tools hacking kali-linux-tools
1
Certain tools are used by both penetration testers and network administrators, such asnmap
scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.
– Sergiy Kolodyazhnyy
Apr 21 at 6:25
add a comment
|
I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?
command-line software-installation tools hacking kali-linux-tools
I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?
command-line software-installation tools hacking kali-linux-tools
command-line software-installation tools hacking kali-linux-tools
edited Apr 20 at 15:02
Yannick
asked Apr 20 at 11:24
YannickYannick
613 bronze badges
613 bronze badges
1
Certain tools are used by both penetration testers and network administrators, such asnmap
scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.
– Sergiy Kolodyazhnyy
Apr 21 at 6:25
add a comment
|
1
Certain tools are used by both penetration testers and network administrators, such asnmap
scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.
– Sergiy Kolodyazhnyy
Apr 21 at 6:25
1
1
Certain tools are used by both penetration testers and network administrators, such as
nmap
scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.– Sergiy Kolodyazhnyy
Apr 21 at 6:25
Certain tools are used by both penetration testers and network administrators, such as
nmap
scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.– Sergiy Kolodyazhnyy
Apr 21 at 6:25
add a comment
|
3 Answers
3
active
oldest
votes
That really depends on the programs.
As with any program you install, you ideally:
- trust the publisher not to perform malicious actions
- trust the publisher to develop secure software
The same trust must be given to any dependencies of the program.
What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.
Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.
As a general guideline, I would use these rules:
- run pentest programs on a dedicated computer or at least dedicated VM if possible.
- the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.
- The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.
add a comment
|
Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.
The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.
10
Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.
– a CVn
Apr 20 at 12:59
2
Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.
– karel
Apr 20 at 13:13
5
I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.
– a CVn
Apr 20 at 13:46
5
Kali linux tools tag,
– karel
Apr 20 at 14:00
add a comment
|
in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual
add a comment
|
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "89"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1135505%2fis-it-dangerous-to-install-hacking-tools-on-my-private-linux-machine%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
That really depends on the programs.
As with any program you install, you ideally:
- trust the publisher not to perform malicious actions
- trust the publisher to develop secure software
The same trust must be given to any dependencies of the program.
What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.
Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.
As a general guideline, I would use these rules:
- run pentest programs on a dedicated computer or at least dedicated VM if possible.
- the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.
- The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.
add a comment
|
That really depends on the programs.
As with any program you install, you ideally:
- trust the publisher not to perform malicious actions
- trust the publisher to develop secure software
The same trust must be given to any dependencies of the program.
What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.
Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.
As a general guideline, I would use these rules:
- run pentest programs on a dedicated computer or at least dedicated VM if possible.
- the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.
- The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.
add a comment
|
That really depends on the programs.
As with any program you install, you ideally:
- trust the publisher not to perform malicious actions
- trust the publisher to develop secure software
The same trust must be given to any dependencies of the program.
What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.
Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.
As a general guideline, I would use these rules:
- run pentest programs on a dedicated computer or at least dedicated VM if possible.
- the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.
- The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.
That really depends on the programs.
As with any program you install, you ideally:
- trust the publisher not to perform malicious actions
- trust the publisher to develop secure software
The same trust must be given to any dependencies of the program.
What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.
Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.
As a general guideline, I would use these rules:
- run pentest programs on a dedicated computer or at least dedicated VM if possible.
- the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.
- The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.
answered Apr 20 at 12:36
timtim
2511 silver badge4 bronze badges
2511 silver badge4 bronze badges
add a comment
|
add a comment
|
Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.
The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.
10
Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.
– a CVn
Apr 20 at 12:59
2
Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.
– karel
Apr 20 at 13:13
5
I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.
– a CVn
Apr 20 at 13:46
5
Kali linux tools tag,
– karel
Apr 20 at 14:00
add a comment
|
Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.
The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.
10
Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.
– a CVn
Apr 20 at 12:59
2
Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.
– karel
Apr 20 at 13:13
5
I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.
– a CVn
Apr 20 at 13:46
5
Kali linux tools tag,
– karel
Apr 20 at 14:00
add a comment
|
Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.
The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.
Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.
The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.
edited May 28 at 23:28
answered Apr 20 at 11:39
karelkarel
69k15 gold badges155 silver badges181 bronze badges
69k15 gold badges155 silver badges181 bronze badges
10
Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.
– a CVn
Apr 20 at 12:59
2
Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.
– karel
Apr 20 at 13:13
5
I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.
– a CVn
Apr 20 at 13:46
5
Kali linux tools tag,
– karel
Apr 20 at 14:00
add a comment
|
10
Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.
– a CVn
Apr 20 at 12:59
2
Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.
– karel
Apr 20 at 13:13
5
I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.
– a CVn
Apr 20 at 13:46
5
Kali linux tools tag,
– karel
Apr 20 at 14:00
10
10
Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.
– a CVn
Apr 20 at 12:59
Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.
– a CVn
Apr 20 at 12:59
2
2
Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.
– karel
Apr 20 at 13:13
Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.
– karel
Apr 20 at 13:13
5
5
I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.
– a CVn
Apr 20 at 13:46
I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.
– a CVn
Apr 20 at 13:46
5
5
Kali linux tools tag,
– karel
Apr 20 at 14:00
Kali linux tools tag,
– karel
Apr 20 at 14:00
add a comment
|
in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual
add a comment
|
in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual
add a comment
|
in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual
in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual
answered Apr 21 at 8:19
salah eddin lamnayrasalah eddin lamnayra
1
1
add a comment
|
add a comment
|
Thanks for contributing an answer to Ask Ubuntu!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1135505%2fis-it-dangerous-to-install-hacking-tools-on-my-private-linux-machine%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
Certain tools are used by both penetration testers and network administrators, such as
nmap
scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.– Sergiy Kolodyazhnyy
Apr 21 at 6:25