Share For All: 10 frequently used tools of the hacker

Wednesday, July 29, 2009

10 frequently used tools of the hacker

NMAP Creator conduct a survey of 100 favorite tools pursuivant nmap-hackers mailing list. Approximately 3.243 users to give voice to the tool they gemari. List of 100 favorite tool of the hacker is found in jg www.insecured.org
100 of the tool, follows below are 10 tools that get your favorite sound throughout most of 2006. The tool is a weapon that is considered absolutely necessary in the event of hacking and security.

1.Nessus
"Nessus" first made by Renaud Deraison in 1998 and spread to the Internet community at large, useful, most well-update and easy to use.
Nessus is a program to search for weaknesses in a computer system. According to the site authorized in www.nessus.org, this tool has been used by more than 75,000 companies and organizations around the world.

2.Snort
Snort is an IDS, which is a tool to prevent and detect attacks against computer systems. Vendor's claim that snort this tool has been downloaded millions of times from their site. You may be interested to try it, please download this tool at www.snort.org.

3.Kismet
Kismet is a tool to detect the wireless connection (802.11b support traffic, 802.11a, and 802.11g), capture packets in a network system and become an IDS (Intrusion detection System).
To find out more about kismet, you can visit the site http://www.kismetwireless.net or go to irc.freenode.net # kismet.

4.Metasploit Framework
Metasploit Framework is an open source project to develop, test and use the code eksploit. Created with the Perl language as the basis and foundation, and consists of components that have complementary dicompile with the C language, assembler, and Python. Metasploit Framework can run on operating systems UNIX, Linux and Windows. A more detailed description you can find in http://www.metasploit.com.

5.Netcat
Netcat networking tool is a utility that can read and write data on a network connection via TCP / IP.
Features that are on the netcat among others:
■ incoming and outgoing connections through TCP or UDP protocol with the port that is used ..
■ Tunneling mode, tunneling from UDP to TCP, to map out the parameters in the network (source port / interface, listening port / interface, and allow the remote host to connect tunnel)
■ Port scanner, to detect the open port.
■ Buffered send-mode and hexdump RFC854 telnet.

6.Hping
Hping is a versatile tool. This tool can be used to test the ability of the firewall, look for the open port, test the security of the network by using different types of protocols, operating systems get information, evaluate the TCP / IP.

7.TCPDump
Tcpdump is also a sniffer. Admin network using this tool to monitor traffic and analyze the problems in case of interference. According to the information in http://www-iepm.slac.stanford.edu/monitoring/passive/tcpdump.html, using Tcpdump packet filter from BSD UNIX to re-capture data (BPF / BSD Packet Filter). BPF receive a copy of the driver sender and the recipient can also paket.Pengguna tcpdump filter packet in accordance with the desire.

8. John The Ripper
A password cracker age of fathers of the hackers is still a favorite tool of 10. Here is a description of the John the Ripper.
"John the Ripper is a password cracker, currently available for UNIX, DOS, WinNT/Win95. Its primary purpose is to detect weak UNIX passwords. It has been tested with x86/Alpha/SPARC Linux, FreeBSD x86, OpenBSD x86, Solaris 2.x SPARC and x86, Digital UNIX, AIX, HP-UX, and IRIX. "

9. Cain And Abel
Cain & Abel is a tool for password problems. This tool can collect passwords with network sniffing method, to-crack passwords using Dictionary attack, Brute-Force and Cryptanalysis attacks, recording VoIP conversation (Voice Over Internet Protocol), to crack wireless networks, analyze traffic in the network. www.oxid.it

10. WireShark / Ethereal
Wireshark / Ethereal is a tool to analyze the network protocol. Also functions as a sniffer. Monitor internet traffic. Wireshark
can run on Windows, MAC OS X, and Linux. www.wireshark.org

Interested? Learn and understand how to use the only tool page 10. We will not really be that great hacker with only 10 on the tool above. But tool2 page has been recognized by all levels Hacker. I can be for additional anda2 to menggeluti computer security in depth.

Comments :

0 comments to “10 frequently used tools of the hacker”

Post a Comment

 

Copyright © 2009 by Share For All