Top 10 Hacking Tools of 2015

~ dimanche 27 septembre 2015
Hacking a network or webapp without using any automatic tool is not feasible anymore. But, selection of the right tool is an important job because your pentesting process and success will then depend on the tools you have selected at the first step. If you search on the internet, you will see loads of hacking tools and softwares, some paid and some free, commercial and even open source. But what are the some top hacking tools? In this story you will see the best hacking tools of 2015.

I have mentioned the year, because it is important, since every year and even month (data collection is not easy on monthly basis) hackers used to adopt different set of tools. Anyway, here are the top hacking & pentesting tools of 2015:


Metasploit - The One & only One:

Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their list of modules. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. One free extra is Metasploitable, an intentionally insecure Linux virtual machine you can use for testing Metasploit and other exploitation tools without hitting live servers.

w3af - This is how you hack a website:

W3af is an extremely popular, powerful, and flexible framework for finding and exploiting web application vulnerabilities. It is easy to use and extend and features dozens of web assessment and exploitation plugins. In some ways it is like a web-focused Metasploit.

Core Impact - Ready to pay, if you want to hack:

Core Impact isn't cheap (be prepared to spend at least $30,000), but it is widely considered to be the most powerful exploitation tool available. It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploiting one machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes. Other good options include Metasploit and Canvas.

sqlmap - Learn to do SQL-Injection

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Canvas - Love zero-day exploits:

Canvas is a commercial vulnerability exploitation tool from Dave Aitel's ImmunitySec. It includes more than 370 exploits and is less expensive than Core Impact or the commercial versions of Metasploit. It comes with full source code, and occasionally even includes zero-day exploits

Social Engineer Toolkit - Human are so dumb:

The Social Engineer Toolkit incorporates many useful social-engineering attacks all in one interface. The main purpose of SET is to automate and improve on many of the social-engineering attacks out there. It can automatically generate exploit-hiding web pages or email messages, and can use Metasploit payloads to, for example, connect back with a shell once the page is opened.

sqlninja - Exploit SQL-Injection & hack a website:

sqlininja exploits web applications that use Microsoft SQL Server as a database backend. Its focus is on getting a running shell on the remote host. sqlninja doesn't find an SQL injection in the first place, but automates the exploitation process once one has been discovered.

Netsparker - The fine tool in the house:

Netsparker is a web application security scanner, with support for both detection and exploitation of vulnerabilities. It aims to be false positive–free by only reporting confirmed vulnerabilities after successfully exploiting or otherwise testing them.

BeEF - Don't forget it Dude:

BeEF is a browser exploitation framework. This tool will demonstrate the collecting of zombie browsers and browser vulnerabilities in real-time. It provides a command and control interface which facilitates the targeting of individual or groups of zombie browsers. It is designed to make the creation of new exploit modules easy.

dradis - Communication Tools for Hackers:

dradis is an open source framework to enable effective sharing of information among participants in a penetration test. It is a self-contained web application that provides a centralised repository of information to keep track of what has been done so far, and what is still ahead. It has plugins to read and collect the output of a variety of network scanning tools, like Nmap, Burp Suite, and Nikto.

Your favorite tool is not in the list, how do I know about your favorite tool. Use your keyboard and let me know what tool you want to add here and why? Justify via comment box and I will let you know about it.

Use the tools and achieve your objectives.. sssseeehhhhhhss do not use them for destruction, let's do something constructive.




0 commentaires :

Enregistrer un commentaire