There are numerous options are available, therefore you should look to obtain a USB GPS that is supported on operating system that you are using be that Linux, Windows and Mac OS X.The software requirements are based upon the engagement scope, however we've listed some commercial and open source software that could be required to properly conduct a full penetration test.

These are not to be used in Florida, Kentucky, or Minnesota unless you are a person who holds a current amateur radio license issued by the Federal Communications Commission.

The required hardware is the Uniden BCD396T Bearcat Handheld Digital Scanner or PSR-800 GRE Digital trunking scanner.

A good example of a reasonably priced spectrum analyzer is the Kaltman Creations HF4060 RF Spectrum Analyzer.

An 802.11 USB adapter allow for the easy connection of a wireless adapter to the penetration testing system.

Useful for decompiling flash apps and finding hard-coded credentials, etc.

One of the most complete penetration testing Linux distributions available.

This section is designed to be the PTES technical guidelines that help define certain procedures to follow during a penetration test.

Something to be aware of is that these are only baseline methods that have been used in the industry.

The operating systems listed below should be run as a guest system within VMware. The Linux platform is versatile, and the system kernel provides low-level support for leading-edge technologies and protocols.