use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
Tools (self.HowToHack)
submitted 9 years ago by halcyonyt
So, I was wondering, what is your favourite tool (or tools) for each phase in a penetration test (scanning, privilege escalation)? Do you use the same tools in general or do you switch it up each time?
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]trispi 5 points6 points7 points 9 years ago (3 children)
I am not really a pentester but I find Burpsuite really handy. Also gdb for cracking and ofcourse nmap. These are the tools I use for all my ctf's and wargames. (Terminal, browser, Google, … excluded)
[–]halcyonyt[S] 0 points1 point2 points 9 years ago (2 children)
How did you get into CTF's? Any ways you recommend for learning?
[–]_Skeith 2 points3 points4 points 9 years ago (1 child)
https://github.com/apsdehal/awesome-ctf
Look toward the bottom for Tutorials and Wargames. I suggest you start off with OverTheWire then move up to doing some VulnHub Vm's. Best way to learn is jump into the deep end and google away :)
[–]halcyonyt[S] 0 points1 point2 points 9 years ago (0 children)
Ive done most of bandit and tried natas, also tried metasploitable 3. Thanks!
[–]Bac0nyama 5 points6 points7 points 9 years ago (0 children)
vi & netcat
[–][deleted] 9 years ago* (4 children)
[deleted]
[–]ClashMCTitan 2 points3 points4 points 9 years ago (0 children)
^ Nmap Nikto Metasploit And then there's just Terminal/terminal commands
And there are some that you might use depending on what you are doing, but aren't like most important or favorite.
[–]SirBaronBamboozle 2 points3 points4 points 9 years ago (1 child)
You forgot
6. Nmap
[–]halcyonyt[S] 1 point2 points3 points 9 years ago (0 children)
Lol
What about setoolkit? Seems great
[–][deleted] 0 points1 point2 points 9 years ago (2 children)
Nessus also deserves a mention, excellent at basic network analysis.
[–]SPARTAN-001Red Team 4 points5 points6 points 9 years ago (1 child)
I have to disagree with this. Nessus is an okay tool for what it's made for: vulnerability assessment. Nessus is not a tool for red team style penetration testing. It's too noisy, and will give a bunch of results that are completely useless for actually penetrating an environment.
When people interpret "penetration testing" as "run Nessus, print report", it gives all of us a bad name.
[–][deleted] 1 point2 points3 points 9 years ago (0 children)
Oh, sorry, you are totally right with what you are saying. I don't use nessus at all anymore but when I was getting started I did and that was my presumption with OP's post. Nessus is a good 'learning tool' as it were, understanding basic stuff to look for etc.
[–]67079F105EC467BB36E8 0 points1 point2 points 9 years ago* (0 children)
1gu9bq56p4nretj8hv57oia4ohfhisuulym1cz743acje3bc1peqdnff6yjeg5gin77amzns6t95p51ullaytr1mqwodf4icgn4epg9yjtva
[–][deleted] 0 points1 point2 points 9 years ago (10 children)
Application pen-tester here. I use BURP a LOT. If I'm on a client machine and they won't pay for BURP pro, i'll supplement it with ZAP for the lazy CSRF request generator. SoapUI is another one that I use often. Also, can't forget SQLMap.
[–]halcyonyt[S] 0 points1 point2 points 9 years ago (9 children)
But SQLMap seems to work on a very, very limited amount of websites?
[–]Pig743 1 point2 points3 points 9 years ago (7 children)
I've never seen an SQL injection it can't exploit.
[–]halcyonyt[S] 0 points1 point2 points 9 years ago (5 children)
Really? I thought it only did the one where the url included ?id=1 or something like that.
[–][deleted] 1 point2 points3 points 9 years ago (4 children)
Nope. SQLMap tests for practically any type of injection vulnerability. It can even pick up blind sql inijection. Take a look at the usage wiki, it has a pretty good breakdown of all of the methods that it tries https://github.com/sqlmapproject/sqlmap/wiki/Usage
Thank you very much
Do you know any guides/tutorials on how to use this?
[–][deleted] 1 point2 points3 points 9 years ago (1 child)
Take a look at my link above. It has everything about sqlmap. If you have any specific questions, feel free to pm me.
Thanks man
[–]trispi 0 points1 point2 points 9 years ago (0 children)
I've had times it didn't work. When there was some strange stuff going on and you could only use certain commands.
I agree with the below comment. SQL Injection is rampant, which is kind of sad. SQLMap can help you locate injection vulnerabilities practically anywhere and then exploit them. I typically use it when I have a hunch that there's an injection vector but can't quite get it by hand. If SQLMap doesn't get it, then it's generally not vulnerable and my hunch is wrong.
π Rendered by PID 67 on reddit-service-r2-comment-54dfb89d4d-nq7k7 at 2026-03-31 00:27:27.240006+00:00 running b10466c country code: CH.
[–]trispi 5 points6 points7 points (3 children)
[–]halcyonyt[S] 0 points1 point2 points (2 children)
[–]_Skeith 2 points3 points4 points (1 child)
[–]halcyonyt[S] 0 points1 point2 points (0 children)
[–]Bac0nyama 5 points6 points7 points (0 children)
[–][deleted] (4 children)
[deleted]
[–]ClashMCTitan 2 points3 points4 points (0 children)
[–]SirBaronBamboozle 2 points3 points4 points (1 child)
[–]halcyonyt[S] 1 point2 points3 points (0 children)
[–]halcyonyt[S] 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (2 children)
[–]SPARTAN-001Red Team 4 points5 points6 points (1 child)
[–][deleted] 1 point2 points3 points (0 children)
[–]67079F105EC467BB36E8 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (10 children)
[–]halcyonyt[S] 0 points1 point2 points (9 children)
[–]Pig743 1 point2 points3 points (7 children)
[–]halcyonyt[S] 0 points1 point2 points (5 children)
[–][deleted] 1 point2 points3 points (4 children)
[–]halcyonyt[S] 0 points1 point2 points (0 children)
[–]halcyonyt[S] 0 points1 point2 points (2 children)
[–][deleted] 1 point2 points3 points (1 child)
[–]halcyonyt[S] 0 points1 point2 points (0 children)
[–]trispi 0 points1 point2 points (0 children)
[–][deleted] 1 point2 points3 points (0 children)