5 Ethical hacking tools that you can't miss


5 Ethical hacking tools that you can't miss
We’ve compiled some of the most popular penetration testing tools to help you through the first steps of a security investigation. You’ll find some of the classic tools that seem to have been around forever and some new tools that might not be familiar.
1.John the Ripper
John the Ripper is one of the most popular password crackers of all time. It’s also one of the best security tools available to test password strength in your operating system, or for auditing one remotely.
This password cracker is able to auto-detect the type of encryption used in almost any password, and will change its password test algorithm accordingly, making it one of the most intelligent password cracking tools ever.
This ethical hacking tool uses brute force technology to decipher passwords and algorithms such as:
  • DES, MD5, Blowfish
  • Kerberos AFS
  • Hash LM (Lan Manager), the system used in Windows NT / 2000 / XP / 2003
MD4, LDAP, MySQL (using third-party modules)
Github.com
2.Metasploit
Metasploit is an open source cyber-security project that allows infosec professionals to use different penetration testing tools to discover remote software vulnerabilities. It also functions as an exploit module development platform.
One of the most famous results of this project is the Metasploit Framework, written in Ruby, which enables you to develop, test and execute exploits easily. The framework includes a set of security tools that can be used to:
  • Evade detection systems
  • Run security vulnerability scans
  • Execute remote attacks
  • Enumerate networks and hosts
Metasploit offers three different versions of their software:
  • Pro: ideal for penetration testing and IT security teams.
  • Community: used by small companies and infosec students.
  • Framework: the best for app developers and security researchers.
Twimg.com
3.Nmap
Nmap  (Network Mapper) is a free open source security tool used by infosec professionals to manage and audit network and OS security for both local and remote hosts.
It’s also regarded as one of the most effective network mappers around, known for being fast and for consistently delivering thorough results with any security investigation.
What can you do with Nmap?
  • Audit device security
  • Detect open ports on remote hosts
  • Network mapping and enumeration
  • Find vulnerabilities inside any network
  • Launch massive DNS queries against domains and subdomains
Supported platforms include:
  • Mac OS X
  • Linux, OpenBSD and Solaris
  • Microsoft Windows
credit: third party image reference
4.Wireshark
Wireshark is a free open-source software that allows you to analyze network traffic in real time. Thanks to its sniffing technology, Wireshark is widely known for its ability to detect security problems in any network, as well as for its effectiveness in solving general networking problems.
While sniffing the network, you’re able to intercept and read results in human-readable format, which makes it easier to identify potential problems (such as low latency), threats and vulnerabilities.
Main features:
  • Saves analysis for offline inspection
  • Packet browser
  • Powerful GUI
  • Rich VoIP analysis
  • Inspects and decompresses gzip files
  • Reads other capture files formats including: Sniffer Pro, tcpdump (libpcap), Microsoft network monitor, Cisco Secure IDS iplog, etc.
  • Supported ports and network devices: Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI.
  • Protocol decryption includes but not limited to IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Exports results to XML, PostScript, CSV, or plain text
credit: third party image reference
5.OpenVAS
OpenVAS (also known as the old classic “Nessus”) is an open-source network scanner used to detect remote vulnerabilities in any hosts. One of the best-known network vulnerability scanners, it’s very popular among system administrators and DevOps and infosec professionals.
Main features
  • Powerful web-based interface
  • +50,000 network vulnerability tests
  • Simultaneous multiple host scanning
  • Able to stop, pause and resume scan tasks
  • False positive management
  • Scheduled scans
  • Graphics and statistics generation
  • Exports results to plain text, XML, HTML or LateX
  • Powerful CLI available
  • Fully integrated with Nagios monitoring software
The free version can be downloaded from the OpenVAS website, but there is also a commercial enterprise license available from the Greenbone Security (parent company) website.
credit: third party image reference

Post a Comment

0 Comments