Password Guesser Attempt to log in by trying lots of different passwords from a database
Web Scanner Scan a public web server for vulnerabilities
Device Scanner Scan a server, printer or IoT device for vulnerabilities
WiFi Scanner Look for visible wifi networks
Network Mapper Scan a network to see what devices are on it
There are dozens of different tools we can use to find holes in systems. Common types of tools are listed in the
Toolkit box on the right.
There are hundreds of different tools used for different purposes. Some hackers are also talented programmers,
so they know how to build their own tools: either custom software for a specific vulnerability or generic tools
for a wide range of purposes.
The image below shows some of the tools you can use to monitor how well a Linux computer is running, to find
bottlenecks and issues. Some of these will give you valuable information about what is running on a system and
what you might exploit. Or they can themselves be abused to make an exploit.
To keep it simple, to keep the story moving, the tools used in your Toolkit are not named specifically. We just
refer to broad classes of tool and leave it to your imagination or to your later research to fill in the
Sometimes you will see Technical Details boxes like this one, with extra technical information where we thought
it would help you understand a little more deeply. These boxes are always optional. There is nothing hidden in
them that will help you find the Donut Preferences Database. These boxes are for the curious, for the
Try it now: click one of the green Use buttons beside a tool to see what it