Top Hacking Softwares Used By Hackers.

Kali Linux Is a Best Operating System used for Penetration Testing by Ethical Hackers.
But it is also misused by Black hats. It consist about  200 inbuilt penetration Tools .
You can use Kali Linux and Window both OS in one system by the use of virtual box or Vmware software.
You can also make your system double boot, but in this way you can’t use both operating system at one time.



But If you are in window you can Use These Tools:

Burpsuire 
Present for both Windows and Linux.

Wireshark
It is also present for both Windows and Linux. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.

Ophcrack
Ophcrack is a password cracking software which are based on rainbow tables.itruns on various operating systems like MAC OS, Unix/Linux, Windows.

Rainbowcrack
RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers.

Aircrack
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. Aircrack-ng is a set of tools for auditing wireless networks.

Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet also supports plugins which allow sniffing other media such as DECT.

FireSheep
Firesheep has a packet sniffer which can intercept the cookies which are encrypted from Social Media sites like Twitter and Facebook and comes with the Firefox web browser. Firesheep is available for both the Windows and Mac OS X operating system.

Airjack
AirJack is a device driver (or suit of device drivers) for 802.11(a/b/g) raw frame injection and reception.

WepLap
Weplab is a tool designed to teach how the Wired Equivalent Privacy (WEP) wireless encryption protocol works, explain the security vulnerabilities in the protocol, and demonstrate attacks that can be used to compromise a WEP protected wireless network.

No comments:

Post a Comment