CASA ȘTIINȚEI
CASA ȘTIINȚEI este locul unde diverse subiecte sunt dezbătute și scrise.
Lista Forumurilor Pe Tematici
CASA ȘTIINȚEI | Inregistrare | Login

POZE CASA ȘTIINȚEI

Nu sunteti logat.
Nou pe simpatie:
bruneta_ta_us pe Simpatie.ro
Femeie
25 ani
Giurgiu
cauta Barbat
25 - 52 ani
CASA ȘTIINȚEI / Pagini albastre / Top 5 Must-Have Tools For Hackers and Security Researchers  
Autor
Mesaj Pagini: 1
blurex
Învățăcel

Inregistrat: acum 7 ani
Postari: 97
Top 5 Must-Have Tools For Hackers and Security Researchers
BY SIKIC · JULY 24, 2016

hacking
Rate this (2 Votes)

In this article I will show you top 5 tools for hackers and security researchers.

When it comes to Hacking, a lot of people start thinking about hacking banks and sci-fi movies, but in real life, It’s something else. Most of the hackers out there are white-hat, it means they hack to notify developers about their security issues. They don’t make public disclosure before developers patch vulnerability.



Black-hat and white-hat hackers use same tools, same methodology, but final is completely different, black-hat hacker will make a mess, but white-hat will try to block him by hacking the system before and notifying developers.
geekyshows1. Burpsuite
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities. There’s two versions of Burpsuite: free and professional. Free version don’t include all the features like: Spider, Scanner, CSRF form generator and many others. Professional version costs $349.00 USD per user per year. If you want to use all the features you can check OWASP’s free alternative called OWASP ZAP

hack-like-pro-metasploit-for-aspiring-hacker-part-3-payloads.1280x6002. Metasploit
Metasploit project is developed by Rapid7 company. It’s well-known tool used by a lot of hackers. It’s also integrated in almost every Linux security distributions like: Kali Linux, BackBox, BlackArch… great thing about Metasploit is exploits. They are made by hackers from all around the world. You can also participate by writing your own Metasploit modules in Ruby. If you are not familiar with command line, you can use Metasploit Pro (not free) to get web user interface. Metasploit works on Linux and MS Windows.

maxresdefault3. Wireshark
Wireshark is tool #1 for traffic analysis. It’s complex so it require documentation if you are first-time user.  Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.

Also Read: Zero Day Vulnerability Found In Joomla!

nmap_logo_vx4. Nmap
Nmap is tool used for network discovery and scanning devices on the network. You can also scan remote networks which makes it so awesome is modules integration. Nmap is mainly used for network discovery and security auditing. Literally, thousands of system admins all around the world will use nmap for network inventory, check for open ports, manage service upgrade schedules, and monitor host or service uptime. Nmap, as a tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are providing information about, what operating systems (fingerprinting) and what type and version of packet filters/ firewalls are being used by the target.

aircrack-ng-620x3505. Aircrack-ng
Aircrack is tool #1 for security checking and exploiting WiFi networks. In the right hands this tool can be very effective. For those new to this wireless-specific hacking program, Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking hacking tool that can recover keys when sufficient data packets have been captured (in monitor mode). For those tasked with penetrating and auditing wireless networks Aircrack-ng will become your best friend.

With these five tools we covered: Web applications, system (services), network traffic, network mapping and WiFi.


pus acum 7 ani
   
Pagini: 1  

Mergi la