Software hacking tools are:
1.Metasploit
2.N map
3.Netsparker
4.Acunetix
5.Ettercap
6 Hashcat
7.Aircrack Ng
8.John the ripper
9.Nessus
10.Angry Ip scanner
1.METASPLOIT:
๐ Metasploit available in free and community versions. It originally developed in 2003 as a movable network tool by HD Moore.
๐ Metasploit is a penetration testing framework it makes hacking simple.
๐ Metasploit is an open source project it offers the public resources to develop codes and research security vulnerabilities.
๐ Metasploit also offers an evasion and anti forensic tools.
๐ Metasploit framework is a software environment to develop, test and execute exploits.
๐ Metasploit can be applied by ethical hackers and cyber criminals for probing systematic susceptabilities on servers and network. (It is easily customised with various operating systems.)
2.N MAP:
๐ Nmap is a security scanner, port scanner and it is a packet generation and response analysis tool.
๐ Nmap is a network security mapper to discovering services and host on a network.
๐ Nmap developed for operating systems based on linux Or unix. Now Nmap is also available for windows version.
๐ Nmap is a free open source tool for vulnerability scanning and network discovery.
๐ Nmap can be used to monitor single hosts and vast network that encompass Hundreades of thousands of devices and multilevels of subnets.
๐ Nmap can be used to detect the version.
๐ Nmap used for network discovery and security auditing. It detects open ports on remote hosts.
3.NETSPARKER:
๐ Netsparker is an web application security scanner. It automatically find SQL injection, XSS and other vulnerabilities.
๐ Netsparker is a unique, dead accurates &fast proof based vulnerability scanning technology it automatically verifies and identified vulnerabilities. So you don't have to manually verify them.
๐ Netsparker scan 1000 web applications in just 24 hours.
๐ Netsparker automatically detects the custom 404 error pages ,URL rules etc..
๐ Rest API for consistent combination with the SELF, bug global positioning frame works.
4.ACUNETIX:
๐ Acunetix it mimics a hacker to keep one step ahead of malicious intruders.
๐ The web application security scanner scans HTML5, JavaScript and single page application.
๐ Acunetix scan all variants SQL injection, XSS, and 4500 vulnerabilities.
๐ It is fast and scalable thousands of pages without interruption.
๐ Acunetix hasan advanced crawler that can find almost any file.
5.ETTERCAP:
๐ Ettercap is an ethical hacking tool. It is used for man in the middle attack on LAN.
๐ Ettercap runs on various unix like operating systems including linux, Mac OS X, BSD and solars and on windows.
๐ Ettercap supports active and passive dissection many protocols.
๐ Ettercap uses ARP poisioning to sniff on a switched LAN between two hosts.
๐ Remote traffic through GRE tunnel the sniffing of remote traffic through GRE tunnel from a remote CISCO router, and perform a man in the middle attack.
๐ GRE- Generic Routing Encapsulation provides a path for transporting packets through an otherwise public path way to encapsulate packets.
๐ Hijacking of DNS requests.
๐ Character can be injected into a server to a client while maintaining a live connection.
6.HASHCAT:
๐ Hashcat is a password recovery tool.
๐ Hashcat in various operating systems are linux, OS X, and windows.
๐ Hashcat supporting hashing algorithms are LM hashes, MD4, MD5, SHA family and unix crypt formats and algorithms used in MYSQL and CISCO pic.
๐ Hashcat has different attacks to find passwords are:
❇Brute force attack.
❇ Combinator attack
❇ Dictionary attack
❇ Fingerprint attack
❇ Permutation attack
❇Mask attack
❇ Hybrid attack
❇Prince attack
❇ Table-lookup attack
❇ Toggle- case attack
7.AIRCRACK-NG
๐ Aircrack crackes vulnerable wirless connections.
๐ Aircrack is a network software suite consisting of a detector packet sniffer, WEP and WPA /WPA2 -psk cracker and analysis tool for wirelesa LAN's
๐ The program runs under linux, free BSD and windows.
๐ Aircrack Ng cracks WEP keys using the Fluhrer, Mantin and Shamir attack(FMS) attack, PTW attack and dictionary attack.
๐ FMS- it is in cryptography the Fluhrer, Mantin and Shamir attack is a stream cipher attack on the widely used RC4 stream cipher.
๐ PTW- The attack is a key ranking strategy it trying all possible combinations of the key.
๐ Aircrack supports all types of OS and platforms.
8.JOHN THE RIPPER:
๐ John the ripper is a free password cracking tool.
๐ It is developed by the unix operating systems. It run on filter differ platforms.
๐ John can use for the dictionary attack.
๐ John also offer bruteforce attack.
๐ John autodetects password hash types and includes a cutomizable cracker.
๐ It is mainly used for testing encrypted passwords.
9.NESSUS:
๐ Nessus is the ethical hacking tool used for vulnerability evaluations and penetration testing operations.
๐ Nessus is a remote security scanning tool which scans a computer and discovering vulnerabilities.
๐ Nessus can also call hydra to launch a dictionary attack.
๐ It uses of find DNS (denial of service) vulnerabilities.
๐ It supports windows OS. It can be installed on a linux.
10.ANGRY IP SCANNER:
๐ Angry ip scanner is a very fast ip address and port scanner.
๐ Angry ip scannee is a open source and cross platform ethical hacking tool.
๐ This software works on mac, windows and linux.
๐ It provides command line interface.
๐ It exports result into many formats.
Comments
Post a Comment