Hacking Tools Used By Hackers
- Premier UNIX vulnerability assessment tool Nessus was a popular free.
- An open source vulnerability scanner until they closed the source code in 2005.
- It removed the free “registered feed” version in 2008.
- A limited ― Home Feed is still available, though it is only licensed for home network use.
- Sniffing the glue that holds the Internet together.
- Wireshark is a fantastic open source network protocol analyzer for Unix and Windows.
- It allows you to examine data from a live network or from a capture file on disk.
- You can interactively browse the capture data, delving down into just the level of packet detail you need.
- Everyone’s favourite open source IDS.
- This lightweight network intrusion detection and prevention system excels at traffic analysis.
- And packet logging on IP networks.
- Through protocol analysis, content searching, and various processors.
- Snort detects thousands of worms, vulnerability exploit attempts, port scans.
- And other suspicious behaviours.
- Snort uses a flexible rule-based language to describe traffic that it should collect or pass.
- And a modular detection engine.
- The network of Swiss army knife.
- This simple utility reads and writes data across TCP or UDP network connections.
- It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts.
- At the same time, it is a feature-rich network debugging and exploration tool.
- Since it can create almost any kind of connection you would need, including port binding to accept incoming connections.
#5 Metasploit Framework
- Hack the Planet Metasploit took the security world by storm when it was released in 2004.
- No other new tool even broke into the top 15 of this list.
- Yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade.
- It ships with hundreds of exploits, as you can see in their online exploit building demo.
- You can make your own exploits writing easier.
- And it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality.
THIS IS FOR EDUCATIONAL PURPOSES ONLY