Many attackers use toolkits (attacker toolkit or attack toolkit) containing several different types of utilities and scripts that can be used to probe and attack systems.
"Attack tool kits allow the creation of new malware and the assembly of an entire attack without having to write the software from scratch."
Once a system has been compromised through malware or other means, an attacker might download and install a toolkit on the system. The toolkit can then be used to further compromise the system on which it has been installed, or to attack other systems. Types of programs typically found in an attacker toolkit include:
- ↑ Best Practices to Address Online and Mobile Threats, at 8.