Dec 5, 2007

Top 10 hacker’s Favourite tools For 2006

network vulnerbility scanner, microsoft anti spyware, techcrunch, techlog, security software

reference
http://www.insecured.org/

NMAP maker Fyodor made a survey 100 hacker’s favourite tool to their nmap-hackers members. Around 3243 respondent give their opinion about their favourite hacking tools. From 100 tools (You can find the list at http://www.insecured.org/) this is top 10 hackers weapons.
Nessus


Author Renaud Deraison
Year: 1998
About Nessus: Vulnerability scanner. Official website http://www.nessus.org/. More than 75 000 organisation already use this tools. It scan computer system vulnerability.

Snort


Is a IDS (Intrusion detection system). More than millions times downloaded from http://www.snort.org/

Kismet

Tools to detect wireless connections( support 802.11b,802.11a and 802.11g ) also a intrusion detection system. http://www.kismetwireless.net/

Metasploit Framework

Open source project to test and expand the exploit code. Programmed in pearl language. Can run in unix , linux, and windows operating system. http://www.metasploit.com/

The GNU netcat

Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.. http://netcat.sourceforge.net/

Hping


hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.



TCPDump




Sniffer

John The Ripper

Password cracker. This tools yet still top 10. John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

Cain and Abel


Pasword cracker. Use bruteforce, dictionary attack, cryptanalysis attack to obtain password. Use to record VOIP conversation and also popular in wireless hacking. http://www.oxid.it/
Wireshark/Ethereal
Tools to analysed net protocol, also a sniffer. Compatible OS is windows, linux, and Mac OS X .

0 comments: