#1 Metasploit

This top hacking tool package of 2016 lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.
#2 Nmap

Nmap is available for all major platforms including Windows, Linux, and OS X.
I think everyone has heard of this one, Nmap (Network Mapper) is a free
open source utility for network exploration or security auditing. It
was designed to Nmap rapidly scan large networks, although it works fine
against single hosts.Many systems and network administrators also find
it useful for tasks such as network inventory, managing service upgrade
schedules, and monitoring host or service uptime. Nmap uses raw IP
packets in novel ways to determine what hosts are available on the
network, what services (application name and version) those hosts are
offering, what operating systems (and OS versions) they are running,
what type of packet filters/firewalls are in use,and dozens of other
characteristics. It may be used to discover computers and services on a
computer network, thus creating a “map” of the network.Nmap runs on most
types of computers and both console and graphical versions are
available. Nmap is free and open source.Can be used by beginners (-sT)
or by pros alike (packet_trace). A very versatile tool, once you fully
understand the results.
#3 Acunetix WVS

Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2016.
#4 Wireshark

#5 oclHashcat

oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later.
This tool employs following attack modes for cracking:
- Straight
- Combination
- Brute-force
- Hybrid dictionary + mask
- Hybrid mask + dictionary
#6 Nessus Vulnerability Scanner

Using Nessus, one can scan multiple types of vulnerabilities that include remote access flaw detection, misconfiguration alert, denial of services against TCP/IP stack, preparation of PCI DSS audits, malware detection, sensitive data searches etc. To launch a dictionary attack, Nessus can also call a popular tool Hydra externally.
Apart from the above mentioned basic functionalities, Nessus could be used to scan multiple networks on IPv4, IPv6 and hybrid networks. You can set scheduled scan to run at your chosen time and re-scan all or a subsection of previously scanned hosts using selective host re-scanning.
#7 Maltego

Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning.
#8 Social-Engineer Toolkit

This Python-driven tool is the standard tool for social-engineering penetration tests with more than two million downloads. It automates the attacks and generates disguising emails, malicious web pages and more.
To download SET on Linux, type the following command:
git clone https://github.com/trustedsec/social-engineer-toolkit/ set/
#9 Nessus Remote Security Scanner

Recently went closed source, but is still
essentially free. Works with a client-server framework.Nessus is the
worlds Nessus Remote Security Scanner most popular vulnerability scanner
used in over 75,000 organizations world-wide. Many of the worlds
largest organizations are realizing significant cost savings by using
Nessus to audit business-critical enterprise devices and applications.
#10 Kismet

No comments:
Post a Comment