Getting Started with Penetration Testing: My Early Notes
Published:
Note: These are my early notes from 2016 when I was learning penetration testing. Some tools have evolved, but the fundamentals remain the same.
Diving into cybersecurity was one of the most challenging but rewarding things I’ve done. Here’s what I learned setting up my Kali Linux environment and the essential tools I used.
Security Tools I Actually Used
Here’s where the real work begins. These are tools I actually spent time learning and using.
Web Application Testing
- Burp Suite
-
The industry standard intercepting proxy. Intercepts HTTP traffic between your browser and the target, lets you modify requests, repeat them, and find vulnerabilities. Essential for any web app testing.
- OWASP Zap
-
Free alternative to Burp. Great for automated scanning and finding common vulnerabilities like XSS and SQL injection. Good starting point for beginners.
- sqlmap
-
Automated SQL injection tool. Give it a URL with a vulnerable parameter and it does the rest - enumerates databases, extracts data, even gains shell access in some cases.
- Dirb/Dirbuster
- Directory brute-forcing. Finds hidden directories and files on web servers by trying thousands of common paths. First step in any web assessment.
Post-Exploitation
- Beef Framework
- Browser exploitation. Hooks victim browsers and executes JavaScript, allowing you to steal cookies, capture keystrokes, and pivot to other systems.
-
Nmap/Zenmap
- Network scanning. Know your targets before attacking.
-
Metasploit
- The exploitation framework. Industry standard.
-
Wireshark
- Packet analysis. Understand what’s happening on the wire.
-
Burp Suite
- Web testing. Every web pentester needs this.
-
John the Ripper
- Password cracking. Essential for privilege escalation.
-
Hydra
- Login brute-forcing. Test weak credentials.
What I Learned
- Always have a lab network isolated from production
- Document everything - you’ll forget the details later
- Python and Bash are your best friends for automation
- Don’t just run tools - understand how they work
- Networking fundamentals are crucial
Leave a Comment
Your email address will not be published. Required fields are marked *