Lc.DB — the Linux.com Article Museum
Originally published: Tuesday, 9 May 2000 Author: Derrick H. Lewis
Published to: news_enhance_security/Security News Page: 1/1   [Standard view]

Hacker's toolchest

[SW] There are hackers capable of penetrating almost any system. The good ones get paid for it. The bad ones pay for it. What is a hacker's approach to penetration testing? What tools do they use? In this column, Carole Fennelly asks noted security specialists Brian Martin, Mark Abene, and Rain Forest Puppy for their perspective.

(this article had no body text)