Top 6 Ethical Hacking Tools

What are Hacking Tools?

Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems. Some of these tools are open source while others are commercial.
In this tutorial, we will look at Ethical Hacking Tools that you can use to identify and exploit security weaknesses in computer systems.

Commonly Used Hacking Tools

The following table lists some of the most commonly used tools.
SR  NO.TOOLSDESCRIPTIONURL Link
1 Nmap  Network Mapper. This tool is used to explore networks and perform security audits.  http://nmap.org/
2 Nessus  This tool can be used to perform;

  • Remote vulnerability scanner
  • Password dictionary attacks
  • Denial of service attacks.

  It is closed source, cross platform and free for personal use.  

http://www.tenable.com/products/nessus  
3John The Ripper  Password cracking utility. It is cross platform.http://www.openwall.com/john/
4Cain & Abel  Microsoft Operating System passwords recovery tool. It is used to;

  • Recover MS Access passwords
  • Uncover password field
  • Sniffing networks
  • Cracking encrypted passwords using dictionary attacks, brute-force, and cryptanalysis attacks.

Visit their URL for more details

http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml
5NetStumblerUsed to detect wireless networks on the Windows platform. It can be used for the following tasks;

  • Verifying network configurations
  • Finding locations with poor coverage in a WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized (“rogue”) access points
  • Aiming directional antennas for long-haul WLAN links
http://www.stumbler.net/
6SQLMapAutomates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.

  • MySQL
  • Oracle
  • Postgre SQL
  • MS SQL Server
  • MS Access
  • IBM DB2
  • SQLite
  • Firebird
  • Sybase and SAP MaxDB

  It supports the following SQL Injection Techniques;

  • Boolean-based blind
  • Time-based blind
  • Error-based
  • UNION query
  • Stacked queries and out-of-band.

Visit their URL for more details  

http://sqlma

LEAVE A REPLY

Please enter your comment!
Please enter your name here