Various screenshots from an older book, many of the exploits referenced are unlikely to be found in the wild these days, but the book still has valuable references.
whois
DNS
Dig
Nslookup
Enumeration countermeasures
Nmap
Xprobe2
More Nmap
Hping2
Network scanning countermeasures
More Dig and nslookup
DNS Zone Transfers
Finger
SNMP
SNMPwalk
LDAP
Remote Information Services Countermeasures
HTTP
SSLTunnel
WebDav
IIS
Trace
Web Servers Countermeasures
Wget
Grep
HTTP Header Fields
XML
ASCII to Hex
Encoding
Hydra
Command Injection






Sql Injection
LDAP
More Command Injection
XSS
Web Security Checklist
FTP
RDP
Remote Services Countermeasures
Database Countermeasures
RPC
NetBIOS
CIFS
Windows Networking Countermeasures
SMTP Open Relay
Email Countermeasures
IKE
IPSec and VPN
VPN Countermeasures
RPC
RPC Countermeasures
Nessus
Links
Summary
Article Name
What are Network Security Assessments
Description
What are Network Security Assessments including examples of very useful pentesting tools.
Author
Mark WH
Publisher Name
OIC Solutions