Examples of this might include applications trying to write to certain parts of a system registry, or writing to pre-defined folders. DNSEnum offers the ability to enumerate DNS through brute forcing subdomains, performing reverse lookups, listing domain network ranges, and performing whois queries. The Best Practices Tab lists issues detected by WebInspect that relate to commonly accepted best practices for Web development.

At this point you can either enter in a single IP address or hostname that you assess. You will then be presented with a certificate to accept.

All mainstream IP-based attack and penetration tools can be built and run under Linux with no problems. This is often best left to automated tools, but it can be accomplished by manually methods as well.