As you probably know, hackers and penetration testers use not only small standalone utilities in their work, but also (probably more often) various sets of security tools and whole OS distributions built for penetration testing and filled with necessary tools.
In the course of this chapter, we are going to review toolkits, frameworks, and distributions and provide examples of their utilization in our lab environment in order to familiarize you with them and help you choose the toolkits you would like to learn in more depth for your tasks.
In this chapter, we are going to cover the following topics:
Wireless hacking tools
Infrastructure hacking tools
Web application hacking tools