Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Top 10 Must have Ethical Hacking Tools



1.Nmap:


             It is abbrievated as  Network Mapper .It is a security scanner used for scanning networks. It is available for most of  windows variants,Linux distros and Macintosh.It comes out with both gui based and teminal based version.It is also called Zenmap in some variants .

   
Snapshot of the Tool  in Windows 10













official site :www.nmap.org
online Tool:
                 nmap-online.com    – Online tool to check your computer

2.Wireshark:
                 It is a tool used of traffic capturing and it is formally classified as a Network protocol analyzer .
             
       Snapshot of the tool in windows 10


   
         official site :www.wireshark.org

3.Nessus:
                 It is a widely used vulnerability scanner.It scans for Misconfiguration,denial-of-service,default passwords etc. It is devoloped by teenable network security and freely available for personal use.It has both web application and offline option.

       Snapshot of the Tool (web application)


                         











           Official website: www.teenable.com

4.Metasploit:
               It is a tool used for  executing exploit code against target machine.These type of attacks are known as web server attacks.The versions of this are different types
                    Metasploit Framework
                    Metasploit Community edition
                    Metasploit Express
                    Metasploit Pro
                    Armitage
       Snapshot of Metasploit Framework
  

               



       








   Official website: www.metasploit.com


5.Ettercap:
               It is tool used for sniffing.It is mostly used for Man-In-The-Middle attacks on lan. It has many features of network and host analysis.it runs on all most all popular environments.


         Snapshot of the Tool in kali linux
                   


6.Sqlmap:
                  IT is open source tool for detecting  and exploiting sql injection flaws.It supports five sql injection techniques i.e time based blind
                                  boolean based blind
                                  error based
                                  union query
                                  stacked query
     Snapshot of the Tool in Kalilinux(terminal based)
                        

                     






       





     Official website: www.sqlmap.org

7.W3af:
                   It is web application security scanner.it identifies sql injection,cross site scripting and harmful file uploads etc,

  Snapshot of the Tool



 Official website: http://www.w3af.org/

8.Aircrack-ng:
                    Aircrack is a network security package tool which consists of packet sniffer,WEP and WPA-2 cracker,detector etc.It runs on all popular operating systems.
                Aircrack-ng is a child of aircrack project(It cracks WEP and WPA keys using Dictionary attacks)
    Snapshot of the Tool in kalilinux(terminal based)



                 






     





  Official website: www.aircrack-ng.org


9.Maltego:
                         It is a software used for forensics and open source intelligence   .It will very useful for information gathering by ethical hackers.it discovers data from open sources and visualises it in graphs.It is also suitale for data mining


    Snapshot of the Tool in kali linux
                         



            Official website: www.paterva.org   


10.John The Ripper:
                           It is the free password cracking  tool.It is one of the most popular password cracking tools.It runs on 15 operating system environments  which includes windows,mac and all open sorce  operating systems like Linux variants,Freebsd etc.
   
           It is open source software you may browse the documentation online http://www.openwall.com/john/doc/
             
Snapshot of the tool in kalilinux(terminal based)




           











Official website: www.openwall.com/john




      This post first appeared on Hackersstop, please read the originial post: here

      Share the post

      Top 10 Must have Ethical Hacking Tools

      ×

      Subscribe to Hackersstop

      Get updates delivered right to your inbox!

      Thank you for your subscription

      ×