Here is a review of some important hacker tools. Lots of other tools can be found at protectivehacks.com store Most hackers use these tools to execute their missions.
Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the
internet from a different location. never revealing your real location.
Proxies(proxy servers)
Normally, when a request is made on the internet, the end server is contacted directly. A proxy stands as an interface between your request and the server which your request is been made to. Your pc contacts it, and it makes the request on your behalf. When the end server gets the request and replies to the proxy, it sends the reply back to you. No direct contact occurs between you and the final destination, the proxy servers information is seen by the site instead of yours. As you learn about proxies, you’ll discover that, they are not allowed for some websites. You are asked to show your identification. But its rare
According to www.Wikipedia.org,
A proxy server has these potential purposes;
It keeps machines behind it anonymous (mainly for security).
To apply access policy to network services or content, e.g. to block undesired sites.
To log / audit usage, i.e. to provide company employee Internet usage reporting.
To bypass security/ parental controls.
To scan transmitted content for malware before delivery. To circumvent regional restrictions.
Most of these hacker tools can be found and downloaded using google and other search engines.
Network Stumbler(NetStumbler)–easily finds wireless signals being broadcast within range. It also has ability to determine Signal/Noise info that can be used for site surveys. Kismet –Kismet will detect and display Service set identifier(SSIDs)that are not being broadcast which is very critical in finding wireless networks. Airsnort –can be used to sniff and crack WEP keys
CowPatty –used as a brute force tool for cracking WPA-PSK, its the New WEP for home Wireless Security. ASLeap –can be used to gather the original data that is being passed across a network at a particular time, if its using LEAP and these sniffed credentials can be cracked.
Port scanners Superscan; constitutes of port scanner, pinger, and resolver Angry IP Scanner : IP address and port scanner
Unicorn scan: Used for information gathering and correlation. Sniffer
A sniffer is a program that is used for monitoring and analyzing network traffic, problems and detection of bottlenecks. Examples are, Tcpdump, airsport, kismet, Wireshark(Ethereal), Dsniff, Ettercap, Cain and Abel. Nmap(Network Mapper") It's used to discover computers and services on a computer network thereby creating a map of the network. It can be used to know, the types of operating system, firewalls a target is using and can scan large networks etc. It can be used on Windows, Linux and Mac.
Wireshark(Ethereal): Ethereal can scan wireless and ethernet data and comes with some robust filtering capabilities.
It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.
Spyrecon is also another password theft device. Google it or to get a copy
Most hackers are considered dreadful because, they have a good knowledge of these hacker tools and some programming languages. While the normal computer user dont.
Know of more tools and what they are used for?
The tools are incomplete I want you to add to the list!
What Other Visitors Have Said
Click below to see contributions from other visitors to this page...
TOOLS OF TRADE TROJANS
The most dangerous as well as mostt used by some crackers and hackers are RATS(remote administration tool).
what are rats
rats are trojans …
Tool Not rated yet Metasploit :The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds …