Commonly Used Hacking Tools

The following table lists some of the most commonly used tools.

 

SR  NO.

TOOLS

DESCRIPTION

URL Link

1  Nmap  

Network mapper. This tool is used to explore networks and perform security audits.

 

https://nmap.org/
2  Nessus  

This tool can be used to perform;

  • Remote vulnerability scanner
  • Password dictionary attacks
  • Denial of service attacks.

 

It is closed source, cross platform and free for personal use.

 

https://www.tenable.com/products/nessus

 

3 John The Ripper  

Password cracking utility. It is cross platform.

https://www.openwall.com/john/
4 Cain & Abel  

Microsoft Operating System passwords recovery tool. It is used to;

 

  • Recover MS Access passwords
  • Uncover password field
  • Sniffing networks
  • Cracking encrypted passwords using dictionary attacks, brute-force and cryptanalysis attacks.

Visit their URL for more details

https://www.oxid.it/cain.html
5 NetStumbler Used to detect wireless networks on the windows platform. It can be used for the following tasks;

  • Verifying network configurations
  • Finding locations with poor coverage in a WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized (“rogue”) access points
  • Aiming directional antennas for long-haul WLAN links

 

https://www.stumbler.net/
6 SQLMap Automates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.

  • MySQL
  • Oracle
  • Postgre SQL
  • MS SQL Server
  • MS Access
  • IBM DB2
  • SQLite
  • Firebird
  • Sybase and SAP MaxDB

 

It supports the following SQL Injection Techniques;

  • Boolean-based blind
  • Time-based blind
  • Error-based
  • UNION query
  • Stacked queries and out-of-band.

Visit their URL for more details

 

https://sqlmap.org/

 

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.