Scanning and Pen Testing

Below are a few options for scanning your system for vulnerabilities

  • Kali Linux

    • Kali Linux is a Linux Distributed which comes with a large list of tools at your disposal to test your system for a wide variety of potential vulnerabilities and flaws in your security.

    • This may be the best tool to begin with. While the learning curve may be steap, you will gain a great deal of knowledge on terminology, understanding activity on your system, better understanding network traffic, acitivity bad actors may use, and more.

    • An option to avoid also needing to know how to install and set up Kail Linux, is to use an image. Linode (another cloud service provider) is one option. They have an image for Kali Linux that makes it easier on you. I do not endorse them. That is simply an example.

  • Another interesting example that I learned. Creating your own DOS or DDOS attack. Only use this on your system or application. Do not use this on something you do not own!

    • Hping3 – This is a simple tool for creating your own DOS attack

    • Saphyra – Another tool that can create DOS/DDOS attacks with advanced capabilities such as custom payloads for each ping.

    • Byob.dev

      • This is a build your own botnet service. This can be used along with the above tools to improve your DDOS testing.

      • Use these tools at your own risk. I do not endorse them. And you should not use them maliciously. Only use for personal testing of your own application that you own.

Last updated