Published: 19 December 2011
I am delivering CEH (Certified Ethical Hacker )classes for years, and every time I deliver the class my students asks the best tools, which will make they job easier. I usually write my recommend tools from day 1 in to board but this time I decided to write it here in to mu blog , so it can reach more people like your self.
Here is my TOP tools for Security or Hacking
1) Wireshark (http://www.wireshark.org/)
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
2) Cain and Abel (http://www.oxid.it/cain.html)
Cain & Abel is a password recovery tool. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
3) NMAP (http://www.insecure.org/nmap)
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
4) John the Ripper (http://www.openwall.com/john/)
Hacking for charity ? Or My name is Johnny I hack stuff , you must heard one of these mottos if you are in security… John the Ripper is a fast password cracker..
5) Nessus (www.Nessus.org)
Nessus® is the world’s most widely-deployed vulnerability and configuration assessment product with more than five million downloads to date. It features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, patch management integration, and vulnerability analysis of your security posture with features that enhance usability, effectiveness, efficiency, and communication with all parts of your organization
6) Kismet (www.kismetwireless.net)
wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff nearly all 802.x wireless network range..
7) GFI LAN Guard (www.gfi.com)$$$
Network security scanner and patch management
8) Core Impact (www.coresecurity.com) $$$
CORE Impact® Pro is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization. Impact Pro allows you to evaluate your security posture using the same techniques employed by today’s cyber-criminals.
9) HPING (www.hping.org/)
Hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
10) THC-Hydra (www.thc.org)
A very fast network logon cracker which support many different services
11) Maltego (www.paterva.com)
Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format.
12) Ophcrack (http://ophcrack.sourceforge.net/)
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.
13) Sysinternals Suite (http://technet.microsoft.com/en-us/sysinternals/bb842062)
Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. This file contains more than 60 of the individual troubleshooting tools and help files.
More to come, soon….
Did you ever wanted to become an Ethical ...
This short course is designed to partially ...
Penetration Testing Framework 0.58 This post ...
If you are trying to use the ...
Speakers: Alan Burchill, Jeremy Moskowitz, ...
Since I have starterd to work for Kemp ...
Did you miss the life sessions for EC Council ...
Microsoft Egypt is Hiring ! If you are based in ...
Articles Most Read
- Certified Ethical Hacking course for FREE
- Free Course :EC Council Network Security Administrator
- Penetration Testing Framework 0.58
- Fix: Couldn’t connect to the source mailbox
- Desktop Security with Windows 7 Applocker, Bitlocker, Forefront End Point Protection
- NLB vs Hardware Load Balancer
- EC Council ENSA Online Course
- Microsoft Egypt is Hiring
- Fix: Exchange Server 2010 SP update errors
- E-Mail Crimes and Violations (how the leakage could occur)