Ethical Hacking Programming, Blogging, Hosting, All Computer Software, PC Software Download, JAVA in hindi, HTML, PHP, C, C++, Free Learning, Software's Download, Technical Videos, Technical Tricks and Tips, How Make Money

Top 6 Ethical Hacking Tools explain very simple language by techprogramers and download links

Top 6 Ethical Hacking Tools


What are Hacking Tools?

Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems. Some of these tools are open source while others are commercial.

In this tutorial, we will look at Ethical Hacking Tools that you can use to identify and exploit security weaknesses in computer systems.

Commonly Used Hacking Tools
The following table lists some of the most commonly used tools.

SR  NO. TOOLS DESCRIPTION     URL Link

1  Nmap   Network Mapper. This tool is used to explore networks and perform security audits.   http://nmap.org/

2  Nessus   This tool can be used to perform;
Remote vulnerability scanner
Password dictionary attacks
Denial of service attacks.
  It is closed source, cross platform and free for personal use.   http://www.tenable.com/products/nessus

3 John The Ripper   Password cracking utility. It is cross platform. http://www.openwall.com/john/

4 Cain & Abel   Microsoft Operating System passwords recovery tool. It is used to;
Recover MS Access passwords
Uncover password field
Sniffing networks
Cracking encrypted passwords using dictionary attacks, brute-force, and cryptanalysis attacks.
Visit their URL for more details http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml

5 NetStumbler Used to detect wireless networks on the Windows platform. It can be used for the following tasks;
Verifying network configurations
Finding locations with poor coverage in a WLAN
Detecting causes of wireless interference
Detecting unauthorized ("rogue") access points
Aiming directional antennas for long-haul WLAN links
  http://www.stumbler.net/

6 SQLMap Automates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.
MySQL
Oracle
Postgre SQL
MS SQL Server
MS Access
IBM DB2
SQLite
Firebird
Sybase and SAP MaxDB
  It supports the following SQL Injection Techniques;
Boolean-based blind
Time-based blind
Error-based
UNION query
Stacked queries and out-of-band.
Visit their URL for more details  
Share:

Follow On YouTube