TOP 5 COMMONLY USED HACKING TOOLS
Hello guys welcome back to ZX Android solutions, So today I've decided to start sharing my knowledge about Hacking and much more.
This post is regarding Commonly used Hacking Tools.
Let's begin....
1. John the Ripper
John the Ripper is an Open Source Password security auditing and password recovery tool available for many operating system. John the Ripper jumbo supports hundreds of hand and cipher type, including for: user password do Unix flavours such as Linux, BSD, Solaris, AIX, QNX, etc. mazOS, Windows, "web apps", groupware, and database servers (SQL, LDAP, etc); network traffic capture ( Windows network authentication, WIFI WPA-PSK, etc.); encrypted private keys (SSH, SnuPG, cryptocurrency wallets. etc.). filesystems and disks (macOS .dmg files and "sparse bundles" ,Windows BiLocker, etc), archives (ZIP,RAR,7z), and document files (PDF, Microsoft Office's, etc). These are just some of the example - there are many more.
2. Metasploit
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. The open-source Metasploit framework is the well-known project, the tool is for developing and executing exploit code against a remote target machine. Metasploit also includes anti-forensic and evasion tools, some are built into the Metasploit framework. Metasploit is pre-installed in kali Linux OS.
3.Nmap
Namp i.e Network Mapper is free and a open-source network scanner. It is used to discover hosts and services on a computer network by sending packets and analysing the responses. Nmap has many features for probing computer networks, including host discovery and services and operating system detection, port scanning, version detection scriptable interaction with the target. All these features can be executed by scripts that provide service detection, vulnerability detection.
4. Wireshark
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communication protocol development, and education. it can run on Linux, macOS, BSD, Solaris, some of Unix operating system and Microsoft windows. T-shark is the terminal based version of Wireshark. Wireshark is similar to tcpdump, but the difference is it has graphical front-end and some sorting and filtering options. It puts network interface controllers into promiscuous mode if supported by interface controller, by this you can see all the traffic visible on that interface including unicast traffic not sent to network interface controller's MAC address.
Wireshark is a data capturing program goes through the encapsulation structure of different networking protocols. Wireshark uses pcap( an API to capture network traffic) to capture packets so it captures packets on the type of network that pcap supports.
5. Nessus
Nessus is best vulnerabilities scanner ( NOT the free one you need to pay to use it, you can get the trail version for 7days) Nessus scans cover a wide range of technologies including operating system, network devices, hypervisors, databases, webservers, and critical infrastructure.
The result of scan is reported in user selected formats- Plain text, XML, HTML and LaTex. results can also be saved in a knowledge base for debugging. On UNIX systems scanning can be automated through command -line client. Distributed of Individual Nessus scanners can be managed through free and open-source tools on both UNIX and Windows.
Nessus provides additional functionality beyond testing for network vulnerabilities. Nessus supports configuration and compliance audits, SCADA audits, and PCI compliance.
Thank You!
Zx Android Solutions.
Comments
Post a Comment