Sunday, February 25, 2018

Top 6 Ethical Hacking Tools

Top 6 Ethical Hacking Tools


Commonly Used Hacking Tools

The following table lists some of the most commonly used tools.
SR  NO. TOOLS DESCRIPTION URL Link
1  Nmap   Network Mapper. This tool is used to explore networks and perform security audits.   http://nmap.org/
2  Nessus   This tool can be used to perform;
  • Remote vulnerability scanner
  • Password dictionary attacks
  • Denial of service attacks.
  It is closed source, cross platform and free for personal use.  
http://www.tenable.com/products/nessus  
3 John The Ripper   Password cracking utility. It is cross platform. http://www.openwall.com/john/
4 Cain & Abel   Microsoft Operating System passwords recovery tool. It is used to;  
  • Recover MS Access passwords
  • Uncover password field
  • Sniffing networks
  • Cracking encrypted passwords using dictionary attacks, brute-force, and cryptanalysis attacks.
Visit their URL for more details
http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml
5 NetStumbler Used to detect wireless networks on the Windows platform. It can be used for the following tasks;
  • Verifying network configurations
  • Finding locations with poor coverage in a WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized ("rogue") access points
  • Aiming directional antennas for long-haul WLAN links
 
http://www.stumbler.net/
6 SQLMap Automates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.
  • MySQL
  • Oracle
  • Postgre SQL
  • MS SQL Server
  • MS Access
  • IBM DB2
  • SQLite
  • Firebird
  • Sybase and SAP MaxDB
  It supports the following SQL Injection Techniques;
  • Boolean-based blind
  • Time-based blind
  • Error-based
  • UNION query
  • Stacked queries and out-of-band.
Visit their URL for more details  
http://sqlmap.org/


visit link download