1 00:00:00,313 --> 00:00:02,730 (soft tones) 2 00:00:06,750 --> 00:00:10,330 - Welcome to lesson nine, Penetration Testing Tools. 3 00:00:10,330 --> 00:00:13,655 In this lesson, you will learn the different use cases 4 00:00:13,655 --> 00:00:15,980 of penetration testing tools. 5 00:00:15,980 --> 00:00:19,410 You will learn how to analyze tool output and data 6 00:00:19,410 --> 00:00:22,370 related to a penetration testing assessment. 7 00:00:22,370 --> 00:00:26,160 Then we will explore different tools for reconnaissance, 8 00:00:26,160 --> 00:00:28,850 enumeration, vulnerability scanning, 9 00:00:28,850 --> 00:00:30,473 and credential attacks. 10 00:00:30,473 --> 00:00:33,920 We will go over tools for persistence, 11 00:00:33,920 --> 00:00:38,580 configuration compliance, evasion, de-compilation, 12 00:00:38,580 --> 00:00:42,850 forensics, debugging, and software assurance. 13 00:00:42,850 --> 00:00:46,550 At the end of this lesson, we will go over how to leverage 14 00:00:46,550 --> 00:00:51,550 Bash scripting, Python, Ruby, and PowerShell 15 00:00:51,570 --> 00:00:53,403 in penetration testing engagements.