Metasploit:-
Metasploit is a exploit framework
written in Rubby. You can use Metasploit for multiple purposes like
Scanning, exploiting, coding,
creating payload and evading them from Antivirus. You can do all of that in a single
package, that is the real power of Metasploit. Check their official site for
more info here.Aircrack-ng:-
Aircrack-ng suite contains all that
tools that required for beginner to highly intense wireless penetration testing.
Aircrack-ng tools are used to test 802.11 WEP/ WPA/ WPA2 PSK passwords strength.
Interesting fact of Aircrack-ng is that the tool is so famous that it was seen
in some movies like Reboot and The Courier. You can use Aircrack-ng tools by
downloading it from their website, You can also use their live cd and VMWare images
to run Aircrack-ng tools.
Wireshark:-
Wireshark is raw network packet
capturing tools used by most network engineers and penetration testers to see
what flows through the network. It captures all network data while in
promiscuous mode and display the data, packet wise in very enhanced and user
friendly graphical interface. Wireshark is totally Free to use you can download
it and give a try know from here.
Nessus:-
Nessus is mostly used Vulnerability
Scanner that supports PC vulnerability scanning to Enterprise level vulnerability
scanning, it is also available for mobile device vulnerability scanning. As
Nessus provide a free Nessus Home version for students, testers, beginners and
more enhanced and advanced version for Enterprises named Nessus Professional,
Nessus Manager, Nessus Cloud. Check their official site for more info here.
Network Mapper (Nmap):-
Nmap or Network Mapper is a Penetration
tester tool of choice. You can scan all open ports, detect Operating system,
grab banner, detect firewall, bypass firewall for port scanning, IDS detection,
and the coolest thing is its own scrip engine. You can test various open
vulnerabilities using Nmap’s script engine. More over it provide different
types of scanning techniques like NULL scan, SYN scan, XMAS scan, SYN stealth
scan, and Ideal scan. Check their official site for more info here.
Burp Suit:-
Burp Suite is an platform for
performing security testing and audits of web applications. Its various tools work
together to support the entire testing process, from initial mapping and
analysis ofan application's attack surface, through to finding and exploiting
security vulnerabilities. Burp Suite mainly act as proxy server through which
tester see what request and responses made between server and client sides.
Burp gives you full control, letting you combine advanced manual techniques with
state-of-the-art automation, to make your work faster, more effective, and more
fun. Check their official site for more info here.
THC Hydra:-
Number one of the biggest security
holes are passwords, as every password security study shows. This tool is a
proof of concept code, to give researchers and security consultants the
possibility to show how easy it would be to gain unauthorized access from
remote to a system. THC Hydra is used to test the password strength, that it
might being cracked or not. And to recover passwords if you lost one by brute forcing
and other password breaking techniques using THC Hydra tool. Check their
official site for more info here.
Netcat:-
Netcat or nc is used to read or write
over network connections using tcp or udp. It is is mostly used in network
debugging or to investigate the network. Netcat is also used to remotely access
the command line of others pc, weather it is Linux or Windows machine. Check
their official site for more info here.
Snort:-
Snort is an open source Intrusion
Detection and Prevention system works on rules. Snort is used for real time
network traffic logging and filtering. Snort is created by Martin Roesch in
1998. Check their official site for more info here.
Tor:-
Tor was originally designed, implemented,
and deployed as a third-generation onion routing project of the U.S. Naval
Research Laboratory. It was originally developed with the U.S. Navy in mind,
for the primary purpose of protecting government communications. Today, it is
used every day for a wide variety of purposes by normal people, the military,
journalists, law enforcement officers, activists, and many others. Using Tor
protects you against a common form of Internet surveillance known as
"traffic analysis. Check their official site for more info here.
No comments:
Post a Comment