4
Using Network Security Tools, Scripts, and Code
In the previous chapters, we learned about network and security protocols. In this chapter, we will provide a comprehensive overview of the various security tools that we will work with later in this book. We will start by describing the main open source and commercial tools. Then, we will look at tools that are used to gather information on our target network (which can be a network that we want to protect), followed by tools for discovering vulnerabilities and network weaknesses.
In this chapter, we're going to cover the following main topics:
- Commercial, open source, and Linux-based tools
- Information gathering and packet analysis tools
- Network analysis and management tools
- Vulnerability analysis ...
Get Network Protocols for Security Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.