A hacking tool is a program designed to assist with hacking, or a piece of software which can be used for hacking purposes.
Examples include Nmap, Nessus, John the Ripper, SuperScan, p0f, and Winzapper.[1] Bribes have also been described as among the most potent hacking tools, due to their potential exploitation in social engineering attacks.[2] Occasionally, common software such as ActiveX is exploited as a hacking tool as well.
Source: Wikipedia
10. Putty
Although putty is not a hacking software by itself, it is a very
useful tool for a hacker. It is a client for SSH and telnet, which can
be used to connect to remote computers.
You may use putty when you want to connect to your Backtrack machine
from your Windows PC. It can also be used to perform SSH tunneling to
bypass firewalls.
9. hping3
Hping3 sends custom ICMP, UDP, or TCP packets and then displays any
replies. It is similar to the ping command, but offers much more control
over the packets sent. This tool is very useful when trying to
traceroute/ping/probe hosts that have firewalls blocking normal pings.
You can even craft your own packets to perform denial of service
attacks using this tool. It is available in Windows and linux.
8. Nessus
Nessus is a comprehensive automatic vulnerability scanner. You have
to give it an IP address as input and it will scan that IP address to
find out the vulnerabilities in that system. Once you know the
vulnerabllities, you can use metasploit to exploit the vulnerablity.
Nessus works both in Windows and Linux.
7.THC Hydra
Hydra is a fast password cracker tool. It cracks passwords of remote
systems through the network. It can crack passwords of many protocols
including ftp,http, smtp etc. You have the option to supply a dictionary
file which contains possible passwords. It is best to use hydra under
linux environment.
6. Aircrack-ng
Aircrack-ng is a set of tools that are used to crack wifi passwords.
Using a combination of the tools in aircrack, you can easily crack WEP
passwords. WPA passwords can be cracked using dictionary or brute force.
Although aircrack-ng is available for Windows, it is best to use it
under Linux environment. There are many issues if you use it under
Windows environment.
5. Burp Suite
Burpsuite is a web proxy tool that can be used to test web
application security. It can brute force any login form in a browser.
You can edit or modify GET and POST data before sending it to the
server. It can also be used to automatically detect SQL injection
vulnerabilities. It is a good tool to use both under Windows and Linux
environments.
4. Metasploit
Metasploit is a huge database of exploits. There are thousands of
exploit codes, payloads that can be used to attack web servers or any
computer for that matter. This is the ultimate hacking tool that will
allow you to actually “hack” a computer. You will be able to get root
access to the remote computer and plant backdoors or do any other stuff. It is best to use metasploit under linux.
3. Cain and Abel
Cain and Abel is a multipurpose windows only hacking tool. It is a
bit old now, but it still does the job well. Cain can be used to crack
windows password, perform man in the middle attacks, capture network passwords etc.
2. Wireshark
Wireshark is a packet sniffer. It captures all network traffic going through a network adapter. When performing man in the middle
attacks using tools like Cain, we can use Wireshark to capture the
traffic and analyze it for juicy info like usernames and passwords. It
is used by network administrators to perform network troubleshooting.
1. Nmap
Nmap is also known as the swiss army knife of hacking. It is the best port scanner with a lot of functions
In hacking, Nmap is usually used in the footprinting phase to scan the ports of the remote computer to find out wich ports are open.
Enjoy..:)
Examples include Nmap, Nessus, John the Ripper, SuperScan, p0f, and Winzapper.[1] Bribes have also been described as among the most potent hacking tools, due to their potential exploitation in social engineering attacks.[2] Occasionally, common software such as ActiveX is exploited as a hacking tool as well.
Source: Wikipedia
10. Putty
9. hping3
8. Nessus
7.THC Hydra
6. Aircrack-ng
5. Burp Suite
4. Metasploit
3. Cain and Abel
2. Wireshark
1. Nmap
In hacking, Nmap is usually used in the footprinting phase to scan the ports of the remote computer to find out wich ports are open.
Enjoy..:)
0 comments:
Post a Comment