Có một vài biến thể / code tận dụng lợi thế của các loại lỗ hổng Cisco IOS mật khẩu 7. Tất cả các biến thể crack Cisco IOS loại 7 mật khẩu, tuy nhiên, sự khác biệt chính trong các biến thể là ngôn ngữ lập trình, trong đó họ được mã hóa. Đánh giá từ số lượng các biến thể có sẵn, | 17 Chapter 1 Introduction to Ethical Hacking until the end of time or until you crash all your systems. Simply pursue the path you re going down until you can t hack it any longer pun intended . One of your goals may be to perform the tests without being detected. For example you may be performing your tests on remote systems or on a remote office and you don t want the users to be aware of what you re doing. Otherwise the users may be on to you and be on their best behavior. You don t need extensive knowledge of the systems you re testing just a basic understanding. This will help you protect the tested systems. Understanding the systems you re testing shouldn t be difficult if you re hacking your own in-house systems. If you re hacking a customer s systems you may have to dig deeper. In fact I ve never had a customer ask for a fully blind assessment. Most people are scared of these assessments. Base the type of test you will perform on your organization s or customer s needs. Chapter 19 covers hiring reformed hackers. Selecting tools As with any project if you don t have the right tools for ethical hacking accomplishing the task effectively is difficult. Having said that just because you use the right tools doesn t mean that you will discover all vulnerabilities. Know the personal and technical limitations. Many security-assessment tools generate false positives and negatives incorrectly identifying vulnerabilities . Others may miss vulnerabilities. If you re performing tests such as socialengineering or physical-security assessments you may miss weaknesses. Many tools focus on specific tests but no one tool can test for everything. For the same reason that you wouldn t drive in a nail with a screwdriver you shouldn t use a word processor to scan your network for open ports. This is why you need a set of specific tools that you can call on for the task at hand. The more tools you have the easier your ethical hacking efforts are. Make sure you that you re using .