Tuesday, August 18, 2009

BEST EVER HACKING TOOLS!

So after all these years, I've recognized these seven tools which are extremely significant in learning to hack and developing an exploit. I've listed them down for you. So if you really are upto it, start off with these:

1>>Nmap

Nmap is a free security scanner which is used to discover computers and services on a computer network, thus creating a "map" of the network. Plus, there is a lot more Nmap can discover about your remote targets. The excellent capabilities of this software has earned it the top slot in this rating.

2>>Cain & Abel

An excellent password recovery tool. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

3>>Wireshark

Wireshark is the world's foremost network protocol analyzer, and is the de facto standard across many industries and educational institutions. Wireshark is software that "understands" the structure of different networking protocols. Thus, it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture the packets on the networks supported by pcap. This software has come a long way and truly deserves a place here.

4>>Putty

PuTTY is a terminal emulator application which can act as a client for the SSH, Telnet, rlogin, and raw TCP computing protocols. If used as a Telnet and SSH client, it can produce very desireable results without much heck. PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems.

5>>Nessus

Nessus is a proprietary comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems. For example:

1>>Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
2>>Misconfiguration (e.g. open mail relay, missing patches, etc).
3>>Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
4>>Denials of service against the TCP/IP stack by using mangled packets


6>>Superscan

Superscan is a free connect-based port scanning software designed to detect open TCP and UDP ports on a target computer, determine which services are running on those ports, and run queries such as whois, ping, ICMP traceroute, and Hostname lookups.

Superscan is a tool used by both system administrators, crackers and script kiddies to evaluate a computer's security. System administrators can use it to test for possible unauthorized open ports on their computer networks, whereas crackers use it to scan for a potentially insecure port in order to gain illegal access to a system.

7>>Metasploit

Metasploit Framework is a tool for developing and executing exploit code against a remote target machine. The basic steps for exploiting a system using the Framework include:

1>> Choosing and configuring an exploit (code that enters a target system by taking advantage of one of its bugs; about 300 different exploits for Windows, Unix/Linux and Mac OS X systems are included);
2>> Checking whether the intended target system is susceptible to the chosen exploit (optional);
3>> Choosing and configuring a payload (code that will be executed on the target system upon successful entry, for instance a remote shell or a VNC server);
4>> Choosing the encoding technique to encode the payload so that the Intrusion-prevention system will not catch the encoded payload;
5>> Executing the exploit.

Note:You can start to learn Cain and Abel and Metasploit by reading the basic tutorials available on this blog. Look in the categories to find them.


0 comments:

Post a Comment