Commonly Used Hacking Tools
The following table lists some of the most commonly used tools.
| SR NO. | TOOLS | DESCRIPTION | URL Link |
| 1 | Nmap | Network Mapper. This tool is used to explore networks and perform security audits. | http://nmap.org/ |
| 2 | Nessus | This tool can be used to perform;
- Remote vulnerability scanner
- Password dictionary attacks
- Denial of service attacks.
It is closed source, cross platform and free for personal use. | http://www.tenable.com/products/nessus |
| 3 | John The Ripper | Password cracking utility. It is cross platform. | http://www.openwall.com/john/ |
| 4 | Cain & Abel | Microsoft Operating System passwords recovery tool. It is used to;
- Recover MS Access passwords
- Uncover password field
- Sniffing networks
- Cracking encrypted passwords using dictionary attacks, brute-force, and cryptanalysis attacks.
Visit their URL for more details | http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml |
| 5 | NetStumbler | Used to detect wireless networks on the Windows platform. It can be used for the following tasks;
- Verifying network configurations
- Finding locations with poor coverage in a WLAN
- Detecting causes of wireless interference
- Detecting unauthorized ("rogue") access points
- Aiming directional antennas for long-haul WLAN links
| http://www.stumbler.net/ |
| 6 | SQLMap | Automates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.
- MySQL
- Oracle
- Postgre SQL
- MS SQL Server
- MS Access
- IBM DB2
- SQLite
- Firebird
- Sybase and SAP MaxDB
It supports the following SQL Injection Techniques;
- Boolean-based blind
- Time-based blind
- Error-based
- UNION query
- Stacked queries and out-of-band.
Visit their URL for more details | http://sqlmap.org/ |
No comments:
Post a Comment