Cyber warfare, a term defined by Clarke (2010) as an action of a nation-state to effectively penetrate another nation's computer resources or networks for the sole purpose of causing malicious damage or even disruption is a major cause of national and global security concerns (p.6).In this paper, we identify some cyber warfare tools (either Attack, Defense, Exploitation), and write a scenario to execute the tools. We also identify if the tool is for UNIX or Windows hacks, Router Attacks, etc. Also identified is why you would want to use the tool as opposed to another tool which may conduct the same form, via comparison and contrast.
Cyber warfare tools
These are the tools that are used in carrying out cyber warfare activities. They may either be attack tools, defense tools as well as exploitation tools.
Exploitation tools
Vulnerability exploitation tools are the tools that are used for gathering information on a given network. These tools are used for assessing the vulnerability points in a give network. They include but not limited the following. Nessus, Metasploit, Core Impact, SQLMap, Social Engineer Toolkit, sqlininja, BeEF, dradis and WebGoa among others (SecTools,2012).In this category, we are going to discuss Nessus.
Nessus is noted...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now