The following table lists some of the most commonly used tools.
SR NO. |
TOOLS |
DESCRIPTION |
URL Link |
1 | Nmap |
Network mapper. This tool is used to explore networks and perform security audits.
|
https://nmap.org/ |
2 | Nessus |
This tool can be used to perform;
It is closed source, cross platform and free for personal use.
|
https://www.tenable.com/products/nessus
|
3 | John The Ripper |
Password cracking utility. It is cross platform. |
https://www.openwall.com/john/ |
4 | Cain & Abel |
Microsoft Operating System passwords recovery tool. It is used to;
Visit their URL for more details |
https://www.oxid.it/cain.html |
5 | NetStumbler | Used to detect wireless networks on the windows platform. It can be used for the following tasks;
|
https://www.stumbler.net/ |
6 | SQLMap | Automates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.
It supports the following SQL Injection Techniques;
Visit their URL for more details
|
https://sqlmap.org/ |