Advertisement
Guest User

transcript

a guest
Feb 23rd, 2020
346
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.29 KB | None | 0 0
  1. hey legends it's me psycho as we all
  2. wants to be hacker so this is the
  3. tutorial for the beginners so today I am
  4. gonna tell you about the 10 very useful
  5. software which are mainly used by all
  6. the hackers so let's start the first and
  7. best software at map is an abbreviation
  8. of network mapper and it's very well
  9. known free open-source hackers tool map
  10. is mainly used for network discovery and
  11. security auditing literally thousands of
  12. system admins all around the world will
  13. use a map for network inventory check
  14. for open ports manage service upgrade
  15. schedules and monitor host or service
  16. uptime map as a tool uses raw IP packets
  17. and creative ways to determine what
  18. hosts are available on the network what
  19. services application name and version
  20. those hosts are providing information
  21. about what operating systems
  22. fingerprinting and what type and version
  23. of packet filter slash firewalls are
  24. being used by the target
  25. the second software's Metasploit dot the
  26.  
  27. Metasploit project is a hugely popular
  28. pen testing or hacking framework
  29. Metasploit along with map see above and
  30. Wireshark see below and probably the
  31. best-known three hacker software tools
  32. out there if you are new to Metasploit
  33. think of it as a collection of hacking
  34. tools and frameworks that can be used to
  35. execute various tasks also we should
  36. also add that if you have never heard of
  37. Metasploit and are interested in getting
  38. into the cybersecurity industry
  39. especially as a penetration tester then
  40. this is a must learnt the third best
  41. software is John the Ripper dot this is
  42. the coolest named tool out there John
  43. the Ripper dot often you'll see it
  44. abbreviated as
  45.  
  46. JT R this is an awesome
  47. bit of hacking software that is designed
  48. to crack even very complicated passwords
  49. dot John the Ripper mostly just referred
  50. to as simply John is a popular password
  51. cracking pen testing tool that is most
  52. commonly used to perform dictionary
  53. attacks this tool can also be used to
  54. perform a variety of alterations the
  55. fourth software which is used by the
  56. hackers as th C Hydra dot we have
  57. purposely placed th C hina underneath
  58.  
  59. John the Ripper because they often go
  60. hand in hand th c Hydra we have
  61. abbreviated to simply Hydra throughout
  62. our site is a hugely popular password
  63. cracker and has a very active and
  64. experienced development team essentially
  65. the C Hydra is a fast and stable network
  66. login hacking tool that will use
  67. dictionary or brute-force attacks to try
  68. various password and login combinations
  69. against an login page this hacking tool
  70. supports a wide set of protocols
  71. including mail pop3 IMAP etc databases
  72. adapt SMB VNC and ssh take a look at
  73. John the RIP v hackers software is OAuth
  74. pizzette bazzetta tag proxies app is now
  75. one of the most popular OWASP projects
  76. the fact that you've reached this page
  77. means that you are likely already a
  78. relatively seasoned cyber security
  79. professional so it's highly likely that
  80. you are very familiar with OAuth not
  81. least the OWASP top 10 threats listing
  82. which is considered as being a guidebook
  83. of web app
  84. patience security this hacking and
  85. pentesting tool is a very efficient as
  86. well as being an easy-to-use program
  87. that finds vulnerabilities and web
  88. applications zach is a popular tool
  89. because it does have a lot of support
  90. and the host community is really an
  91. excellent resource for those that work
  92. within cybersecurity zach provides
  93. automated scanners as well as various
  94. tools that allow you the cyber pro to
  95. discover security vulnerabilities
  96. manually understanding and being able to
  97. master this tool would also be
  98. advantageous to your career as a
  99. penetration tester if you are a
  100. developer then you have it's obviously
  101. highly recommended that you learn how to
  102. become very proficient with this hacker
  103. tool 6 hacking software is well known to
  104. all the hackers and it's widely used dot
  105. the name of this software is Wireshark
  106. dot Wireshark is a very popular pen
  107. testing tool and for over a year it was
  108. not included on our list
  109. however by popular demand we added it in
  110. late June 2016
  111.  
  112. Wireshark essentially captures data
  113. packets in a network in real time and
  114. then displays the data in human readable
  115. format for both the tool platform has
  116. been highly developed and it includes
  117. filters color coding and other features
  118. that lets the user dig deep into network
  119. traffic and inspect individual packets
  120. if you'd like to become a penetration
  121. tester or work as a cyber security
  122. fraction err then learning how to use
  123. Wireshark is a must there are a ton of
  124. resources out there to learn Wireshark
  125. and of particular interest there's also
  126. a Wireshark certification which you can
  127. achieve in place on your LinkedIn
  128. profile vii software used by the hackers
  129. is aircrack-ng dot the aircrack suite of
  130. Wi-Fi wireless hacking tools are
  131. legendary because they are very
  132. effectively when used in the right hands
  133. for those new to this wireless specific
  134. hacking program aircrack-ng is an 802.11
  135.  
  136. WEP and WPA PSK keys cracking hacking
  137. tool that can recover keys when
  138. sufficient data packets have been
  139. captured in monitor mode for those
  140. tasked with penetrating and auditing
  141. wireless networks aircrack-ng will
  142. become your best friend it's useful to
  143. know that aircrack-ng
  144. implements standard FMS attacks along
  145. with some optimizations like Caraga tax
  146. as well as the PTW attacks to make their
  147. attacks more potent if you are a
  148. mediocre hacker then will be able to
  149. crack WEP in a few minutes and you ought
  150. to be pretty proficient at being able to
  151. crack wpa wpa2 for those interested in
  152. wireless hacking we'd also highly
  153. recommend taking a look at the very
  154. awesome Reaver another very popular
  155. hacking tool that alas we couldn't add
  156. to our the eight softwares mauled go
  157. multigo is different in that it works
  158. within the digital forensics sphere
  159. montgo is a platform that was designed
  160. to deliver an overall cyber threat
  161. picture to the enterprise or local
  162. environment in which an organization
  163. operates one of the awesome things about
  164. multigo which likely makes it so popular
  165. and included in the kali linux top-10 is
  166. its is unique perspective in offering
  167. both network and resource based entities
  168. as the aggregation of information source
  169. throughout in the web whether it's the
  170. current configuration of a vulnerable
  171. router within a network or the current
  172. whereabouts of your staff members on
  173. their international visits multi ou can
  174. locate aggregate and visualize this data
  175. for those interested in learning how to
  176. use malta we'd also recommend learning
  177. about OS and cyber security data
  178. procurement nineth software is
  179. well-known to all people known as Cain
  180. and Abel hacking tool dot Cain and Abel
  181. often simply abbreviate it to Cain is a
  182. hugely popular hacking tool and one that
  183. is very often mentioned online in a
  184. variety of hacking tutorials at its
  185. heart Cain and Abel is a password
  186. recovery tool for Microsoft Windows
  187.  
  188. but it can be used off-label and the variety
  189. of uses for example white and black hat
  190. hackers use came to recover that is
  191. crack many types of passwords using
  192. methods such as network packet sniffing
  193. and by using the tube to crack password
  194. hashes Cain for example when used to
  195. crack password hashes would use methods
  196. such as dictionary attacks brute force
  197. rainbow table attacks in cryptanalysis
  198. attacks and the last in the most useful
  199. software as nikto a website
  200. vulnerability scanner dot nikto is an
  201. classic hacking tool that a lot of pen
  202. testers like to use worth mentioning
  203. that nikto is sponsored by Ness Parker
  204. which is yet another hacking tool that
  205. we have also listed in our directory
  206. nikto is an open source GPL web server
  207. scanner which is able to scan and detect
  208. web servers for vulnerabilities the
  209. system searches against a database of
  210. over 6,800 potentially dangerous files
  211. slash programs when scanning software
  212. stacks nikto like other scanners out
  213. there also scans for outdated unpatched
  214. versions of over 1300 servers and
  215. version specific problems on over 275
  216. servers interestingly nikto can also
  217. check server configuration items such as
  218. the presence of multiple index files
  219. HTTP server options and the platform
  220. will also try to identify installed web
  221. servers and web applications
  222. nikto will get picked up by any
  223. semi-decent ids tool so it's really
  224. useful when conducting a white hat slash
  225. white box pendous certainly a great tool
  226. to learn your skills on when attacking
  227. an open box fort
  228. you
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement