Skip to main content

TOP 6 ETHICAL HACKING TOOLS

SR  NO.TOOLSDESCRIPTIONURL Link
1 Nmap  Network Mapper. This tool is used to explore networks and perform security audits.  http://nmap.org/
2 Nessus  This tool can be used to perform;
  • Remote vulnerability scanner
  • Password dictionary attacks
  • Denial of service attacks.
  It is closed source, cross platform and free for personal use.  
http://www.tenable.com/products/nessus  
3John The Ripper  Password cracking utility. It is cross platform.http://www.openwall.com/john/
4Cain & Abel  Microsoft Operating System passwords recovery tool. It is used to;  
  • Recover MS Access passwords
  • Uncover password field
  • Sniffing networks
  • Cracking encrypted passwords using dictionary attacks, brute-force, and cryptanalysis attacks.
Visit their URL for more details
http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml
5NetStumblerUsed to detect wireless networks on the Windows platform. It can be used for the following tasks;
  • Verifying network configurations
  • Finding locations with poor coverage in a WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized ("rogue") access points
  • Aiming directional antennas for long-haul WLAN links
 
http://www.stumbler.net/
6SQLMapAutomates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.
  • MySQL
  • Oracle
  • Postgre SQL
  • MS SQL Server
  • MS Access
  • IBM DB2
  • SQLite
  • Firebird
  • Sybase and SAP MaxDB
  It supports the following SQL Injection Techniques;
  • Boolean-based blind
  • Time-based blind
  • Error-based
  • UNION query
  • Stacked queries and out-of-band.
Visit their URL for more details  
http://sqlmap.org/

Comments

Popular posts from this blog

Top 20 Tools for hacking 2018

What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution. In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks 1)  Netsparker Netsparker  is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution. Features Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology. Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages. REST API for seamless integration with the SDLC, bug tracking systems etc. Fully scalable s...

Hack the Box Challenge: Brainfuck Walkthrough

Hello friends!! Today we are going to solve another CTF challenge “Brainfuck” which is retired vulnerable lab presented by Hack the Box for making online penetration testing practices according to your experience level. Although in this challenge you can test your expertise by WordPress penetration testing and how much knowledge you have in cryptography by decrypting any encryption that you will get in this lab. Level:  Hard Task:  find  user.txt  and  root.txt  file in victim’s machine. Since these labs are online available therefore they have static IP and IP of sense is  10.10.10.17  so let’s begin with nmap port enumeration. nmap -A 10.10.10.17                   From given below image, you can observe we found so many ports are open such as 22,25 and so on in victim’s network and moreover I got three domain names as highlighted ...