I've been looking at getting one of these or a similar clone, but are you able to get "security torx" for it since it does not take standard size bit's?
Stop the TSA now! Boycott the airlines.
Glad to see others use Maltego here
My two most commonly used tools are nmap and netcat. Netcat for pure versatility and nmap because it has just continued to evolve into much more than just a portscanner, big credit to Fyodor
I still love nbtscan!!!! And Sam Spade. I cant help it.
<EeePc 1000HA BT4/W7 USB boot Alfa500 GPS BlueTooth>
These are the ones I use the most:
nmap - discovery
nsat - intranet (x11, ftp, snmp, nfs)
xspy - x11 exploitation (port 6000)
metagoofil - discovery (phishing)
airodump - wireless exploitation
kismet - wireless discovery
sqlping - sql brute forcing (SA account)
oscanner - oracle discovery
asleap - LEAP exploitation
john - cracking LEAP
dnsenum - discovery
Those are the most common. Depending on the job, there are many more that come in handy, hydra, medusa, etc.
Of course, if you really wanted to have some fun, go to Wal-Mart late at night and ask the greeter if they could help you find trashbags, roll of carpet, rope, quicklime, clorox and a shovel. See if they give you any strange looks. --Streaker69
SQLiX & SQLmap
A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.
these are the steps i use before starting a pentest
1) scan - nmap (usually the -sS and -O options )
2) verify ports by searching - nc all the ports to see outcome
3) scan web server - if http server is available with nikto
4) exploit a vulnerable port or service - by using metasploit framework or the milw0rm library .
and i use all these steps from a proxy machine make it funnnnnnneeerrrrrr