TOP 10 HACKING TOOLS AND SOFTWARES
|
|
Nmap
|
Managing
your security program can be hard, but remediating your vulnerabilities
doesn't have to be. Risk I/O brings all of your scan data results together
into one spot, so you have more time for prioritizing and solving real
problems.
|
Nessus Remote Security Scanner
|
Nessus leverages
credentialed and uncredentialed scans; patch, configuration, and mobile
device managers; external repositories; website reputation; and global threat
intelligence to reduce risk and protect sensitive data
|
John
the Ripper
|
John
the Ripper is free and Open Source software, distributed primarily in source
code form. If you would rather use a commercial product tailored for your
specific operating system, please consider John the Ripper Pro, which
is distributed primarily in the form of "native" packages for the
target operating systems and in general is meant to be easier to install and
use while delivering optimal performance.
|
Nikto
|
Nikto is an Open
Source (GPL) web server scanner which performs comprehensive tests against
web servers for multiple items, including over 6500 potentially dangerous
files/CGIs, checks for outdated versions of over 1250 servers, and version
specific problems on over 270 servers. It also checks for server
configuration items such as the presence of multiple index files, HTTP server
options, and will attempt to identify installed web servers and software.
Scan items and plugins are frequently updated and can be automatically
updated.
|
SuperScan
|
SuperScan
is a powerful TCP port scanner, that includes a variety of additional
networking tools like ping, traceroute, HTTP HEAD, WHOIS and more. It uses
multi-threaded and asynchronous techniques resulting in extremely fast and
versatile scanning. You can perform ping scans and port scans using any IP
range or specify a text file to extract addresses from. Other features
include TCP SYN scanning, UDP scanning, HTML reports, built-in port
description database; Windows host enumeration, banner grabbing and more.
|
p0f
|
P0f is a tool
that utilizes an array of sophisticated, purely passive traffic
fingerprinting mechanisms to identify the players behind any incidental
TCP/IP communications (often as little as a single normal SYN) without
interfering in any way. Version 3 is a complete rewrite of the original
codebase, incorporating a significant number of improvements to network-level
fingerprinting, and introducing the ability to reason about application-level
payloads (e.g., HTTP).
|
Wireshark
|
Wireshark
is the world's foremost network protocol analyzer. It lets you capture and
interactively browse the traffic running on a computer network. It is the de
facto (and often de jure) standard across many industries and educational
institutions.
|
Yersinia
|
Yersinia is a
network tool designed to take advantage of some weakeness in different
network protocols. It pretends to be a solid framework for analyzing and
testing the deployed networks and systems.
|
Eraser
|
Eraser
is an advanced security tool for Windows which allows you to completely
remove sensitive data from your hard drive by overwriting it several times
with carefully selected patterns. Eraser is currently supported under Windows
XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows
Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2.
|
PuTTY
|
PuTTY is an SSH
and telnet client, developed originally by Simon Tatham for the Windows
platform. PuTTY is open source software that is available with source code
and is developed and supported by a group of volunteers.
|
Monday, 6 May 2013
Free Knowledge About 10 Hacking Softwares
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment