
External Attack Surface Management
Attack Surface Management EASM
What Are External Attack Surface Management Tools? External attack surface management (EASM) tools continuously discover …

Learn which penetration testing tools fit your workflow, from network scanners to leaked credential lookups.
• Real attackers don’t scan for vulnerabilities first. They search for leaked passwords. Your toolkit should follow that same order
• Hash cracking takes hours. Querying a breach database for the same password takes seconds. That time difference changes how you scope engagements
• A web app test and a red team assessment need completely different tools. Picking the wrong ones wastes billable hours on the wrong attack path
• The tools that let you automate via API pay for themselves. Manual lookups between tools are where engagements lose time
According to Verizon’s 2025 DBIR, 88% of web app breaches involve stolen credentials. That stat should change how you pick your tools.
Most pen testing tool lists recommend the same well-known open-source tools like Nmap and Metasploit. They miss the credential intelligence category entirely, even though stolen credentials are the top initial access vector year after year.
A web app assessment calls for Burp Suite. An assumed-breach scenario calls for leaked credentials from actual breaches. Picking the wrong tools wastes billable hours.
This guide covers tools across every pen testing phase, with honest takes on what each one does well.
You’ll hear “pen test” used loosely. Here’s what it actually means.
Penetration testing is an authorized security assessment where you simulate real attacks against a target to find vulnerabilities before attackers do. You’ll use automated tools and manual techniques to probe defenses and escalate access. Then you document what you find. The goal is proving what’s exploitable, not just listing what’s vulnerable.
Your tools break down by what phase of the engagement they cover:
You’ll typically move through five phases: Recon, Credential Intelligence, Vulnerability Discovery, Exploitation, Reporting. But real engagements aren’t linear. You’ll bounce between tools as you find new targets.
Here’s what most tool guides miss: real attackers start with credentials. Stolen passwords from old breaches and stealer logs are cheaper and faster than zero-day exploits. Your toolkit should reflect that.
Here’s a breakdown of the tools that matter most, organized by what they actually do.
| Tool | Category | Key Strength |
|---|---|---|
| Breachsense | Credential Intelligence | 300B+ breach records, plaintext passwords, stealer logs |
| Burp Suite | Web App Testing | Intercepting proxy, scanner, BApp extensions |
| Metasploit | Exploitation | Massive exploit database, post-exploitation modules |
| Nmap | Network Scanning | Fast port scanning, NSE scripts, OS fingerprinting |
| Nessus | Vulnerability Scanning | CVE coverage, compliance checks |
| John the Ripper / Hashcat | Password Cracking | GPU-accelerated hash cracking |
| Wireshark | Network Analysis | Deep packet inspection, protocol decoding |
| Shodan | Recon / OSINT | Exposed service discovery, IoT search |
| OWASP ZAP | Web App Testing | Open-source scanning, CI/CD integration |
| Kali Linux | Platform | Pre-installed tools, pen testing OS |
Breachsense gives you what attackers already have: plaintext passwords and session tokens from 300 billion+ breach records and infostealer logs.
Query by domain or email and get instant results through the API. No hash cracking, no wordlists, no GPU rigs. You’ll get the same credentials that show up on hacker forums and Telegram channels.
Best for: Red team initial access, credential reuse testing, client exposure demos, assumed-breach scenarios.
Why it matters: Stealer logs capture saved passwords directly from infected devices, even unique ones. Breachsense shows you which passwords leaked and where. That turns a theoretical risk into a live demo.
Burp Suite is the industry standard for web app pen testing. Its intercepting proxy lets you inspect and modify every request between the browser and server. The scanner catches common web vulnerabilities automatically, and the extension ecosystem (BApps) adds specialized testing capabilities.
Best for: Web application security assessments, API testing, manual web app exploitation.
If you need to prove a vulnerability is exploitable, Metasploit probably has a module for it. It’s the most widely used open-source exploitation framework, with a huge database of tested exploits and post-exploitation modules. Payload generation is built in.
Best for: Network pen tests, exploit development, post-exploitation and lateral movement.
Nmap is the go-to port scanner and network mapper. It’s fast and scriptable through NSE (Nmap Scripting Engine). OS fingerprinting comes standard. Every pen test starts with Nmap.
Best for: Initial recon, network mapping, service enumeration, firewall testing.
You won’t exploit anything with Nessus directly. It’s an enterprise vulnerability scanner with broad CVE coverage and compliance checking. But it feeds your engagement by identifying what to test manually.
Best for: Vulnerability assessments, compliance audits, identifying patch gaps across large networks.
These two cover offline hash cracking. Hashcat uses GPU acceleration for speed. John the Ripper handles rule-based cracking and supports a wide range of hash formats. When you dump NTLM hashes from a domain controller, these tools turn them into plaintext.
Best for: Cracking captured password hashes, proving weak password policies.
Worth noting: Hash cracking takes hours or days depending on complexity. Breachsense returns cracked passwords in seconds because the work is already done. If the target’s credentials leaked in a previous breach, you skip the cracking step entirely.
Wireshark captures and analyzes network traffic at the packet level. During post-exploitation, it helps you find credentials in cleartext protocols and analyze lateral movement traffic.
Best for: Network forensics, traffic analysis, protocol debugging, finding cleartext credentials on the wire.
Shodan indexes internet-facing devices and services. It shows you exposed databases and misconfigured servers that shouldn’t be public. It catches IoT devices too. Pair it with Nmap for targeted scanning of what Shodan finds.
Best for: External reconnaissance, finding exposed services, scoping internet-facing attack surface.
ZAP is the open-source alternative to Burp Suite. It handles active scanning and API testing. It also integrates into CI/CD pipelines, which makes it popular for DevSecOps workflows. It’s free and community-maintained.
Best for: Budget-conscious teams, DevSecOps integration, automated security scanning in CI/CD.
Most pen testers run Kali as their primary testing environment or in a VM. It ships with hundreds of pre-installed security tools and gets regular updates. If you don’t want to spend a day installing tools on a fresh Linux box, Kali handles that for you.
Best for: Dedicated pen testing environments, having every tool pre-installed and configured.
Here’s how tools map to each phase of a typical engagement. You’ll notice Phase 2 is one most pen testers skip. It shouldn’t be.
Credential intelligence means querying leaked passwords and session tokens from breaches and stealer logs during authorized security assessments. Instead of cracking hashes or brute-forcing logins, you search for credentials that already leaked. This gives you the same starting point real attackers have when they target your client.
Phase 1: Reconnaissance. Start with Nmap to map the network and Shodan to find exposed services. Enumerate subdomains and public-facing assets. This gives you the attack surface.
Phase 2: Credential intelligence. Before you touch a single exploit, query Breachsense for the target domain. If employee credentials leaked in previous breaches, you’ve got valid passwords to test. This step alone can give you initial access without firing a single exploit.
Phase 3: Vulnerability discovery. Run Nessus against internal networks. Use Burp Suite or ZAP against web apps. Look for misconfigurations and missing patches.
Phase 4: Exploitation. Use Metasploit for known exploits. Test leaked credentials against VPN portals and email systems. Combine credential reuse with technical vulnerabilities for maximum impact.
Phase 5: Reporting. Document everything. Show the client how you gained access and what data you reached. Make the business impact clear.
Bottom line: if you’re skipping Phase 2, you’re not testing the way attackers actually operate.
When you’re evaluating tools for your team, focus on these factors:
API access and automation. Tools with APIs save time across every engagement. If you’re manually copying results between tools, you’re wasting time. Look for RESTful APIs with good documentation.
Data freshness. This matters most for credential intelligence. Leaked credentials from last year’s breach are useful. Credentials from last week’s infostealer campaign are more useful. Check how often a platform updates its data.
Licensing model. Open-source tools like Nmap and Metasploit cost nothing. Commercial tools like Burp Suite Pro and Nessus charge per seat or per year. Credential intelligence platforms like Breachsense typically price by query volume or API access tier. Factor this into your per-engagement costs.
Integration with your workflow. The best tool is the one your team actually uses. If it doesn’t fit your existing workflow, it won’t get used regardless of its capabilities.
Reporting. Clients care about the report, not the tools. Look for tools that export findings in formats you can drop into your reporting templates.
The right pen testing toolkit depends on what you’re testing. Web app assessments lean on Burp Suite and ZAP. Network pen tests need Nmap and Metasploit. Assumed-breach and red team engagements need credential intelligence from Breachsense.
Start by matching tools to the engagement type, then fill gaps as you find them. And don’t skip credential intelligence. It’s the fastest path to initial access and the closest thing to how actual intrusions start.
Check your organization’s exposure with a dark web scan or book a demo to see how Breachsense fits into your pen testing workflow.
The most widely used pen testing tools include Burp Suite for web app testing and Metasploit for exploitation. Nmap handles network scanning while Nessus covers vulnerability assessment. For credential intelligence, Breachsense gives pen testers access to 300 billion+ leaked credentials including plaintext passwords from breaches and stealer logs.
Yes, when you have written authorization from the client. Your engagement contract should explicitly allow testing with compromised credentials found in third-party breaches. Always document the source of credentials and get proper scope approval. Refer to NIST SP 800-115 for pen testing authorization guidelines. The OWASP Web Security Testing Guide also covers ethical testing frameworks.
Red teams query target employee credentials from recent breaches and test password reuse across VPN and email systems. They use valid credentials instead of exploiting vulnerabilities. This mirrors how actual intrusions happen. You’ll query a breach intelligence platform by target domain to find leaked passwords, then test those credentials against exposed services.
Vulnerability scanning is automated and identifies known weaknesses. Penetration testing is manual and goal-oriented. It proves whether vulnerabilities are actually exploitable. A scanner flags a weak SSH config. A pen tester uses leaked credentials to log in through that SSH service and escalate to root. Both matter, but pen testing shows real-world impact.
Open-source tools like Nmap and Metasploit cover most technical needs. Commercial tools fill gaps in credential intelligence and enterprise vulnerability scanning. Most pen testers use a mix. The deciding factor is usually whether you need access to data you can’t generate yourself, like leaked credentials from breaches.
Breach intelligence gives you real credentials attackers already have. You’ll escalate privileges faster and demonstrate credential reuse risk to clients. According to Verizon’s 2025 DBIR, 88% of web app breaches involve stolen credentials. Real leaked passwords show risk better than theoretical vulnerabilities like weak TLS ciphers.

Attack Surface Management EASM
What Are External Attack Surface Management Tools? External attack surface management (EASM) tools continuously discover …

Threat Intelligence Dark Web Monitoring
What Is Cyber Threat Intelligence Software? You can’t monitor every dark web forum and criminal channel yourself. CTI …