Sunday, 23 February 2014

Network Security Tools For Security Researchers And Penetration Testers To Use

penetration testing, network security, wireshark, metasploit, Ethereal, ping, hacker, hacking, cracking, Snort, Nessue, best network security tools, top network security tools, best penetration testing toolsPenetration testing and network security is a pretty vast topic. These tools cover almost every aspect of it.

Network security is one of the biggest buzzwords nowadays. There are a number of security tools available, each with its own unique ability. That said, there are some that you will find on almost every security expert's computer. These are the ones that are the best and should be on your computer too. Here are 30 of the top network security tools, stay tuned for more.
1. Wireshark

This one was known as Ethereal till the summer of 2006. It is an open source platform network protocol analyzer.

Latest release: 26 July 2013, version 1.10.1

2. Metasploit

This is an open source platform that was released in 2004. It can be launched for developing, testing and using exploit codes. While the framework is free and open source, since its acquisition by Rapid7 in 2009, but there are paid editions to it too.

Latest release: 7 December 2012, version 4.5

3. Nessus

This is another one of the most popular network security tools. It is a vulnerability scanner that costs $1,200. It used to be a free and open source application till 2005.

Latest release: 7 May 2013, version 5.2.1

4. Aircrack

This tool used the best cracking algorithms for 802.11 A/b/g WEP and WPA cracking. It is best used to recover wireless keys.

Latest release: 24 April 2010, version 1.1

5. Snort

This is one of the best available network intrusion applications that has its forte in traffic analysis and packet logging on IP networks. Snort itself is free and open source, but SourceFire (the parent company) offers other complimentary products at a price. In addition, it offers its own VRT-certified rules for $499 per sensor per year.

Latest release: 30 July 2013, version 2.9.5.3

6. Cain and Abel

How is this security tool different from others? Well, it’s a Windows only tool, which is very unlike other tools that support Linux and UNIX before Windows. Cain & Abel is a password recovery tool that can handle a number of tasks.

Latest release: 3 December 2011, version 4.9.43

7. BackTrack

If you’re even remotely involved with hacking you would have heard of BackTrack. This is a Live CD Linux distribution that comes from Whax and Auditor. It has a huge suite of security and forensics tools and is known to be the hacker’s distribution.

Latest release: 13 August 2012, version 5 R3

8. Netcat

Want to read data across UDP or TCP network connections? This is the go to tool for most security personnel for this purpose. First released in 1995 by Hobbit, it is one of the most popular security tools. Interestingly, it hasn’t been maintained despite its popularity. Recognising its usefulness, the Nmap Project made a modern version of the tool called Ncat.

Latest release: 20 March 1996, version 1.10

9. tcpdump

This is a network traffic sniffer that lost its popularity to Wireshark. It still have a respectably large user base though.

Latest release: 20 May 2013, version 4.4.0

10. John the Ripper

Compatible with the Linux, UNIX and Mac OS X platforms, this is a commonly used password cracker.

Latest release: 30 May 2013, version 1.8.0

11. Kismet

This tool is a wireless network detector, intrusion detection system and network sniffer that is used quite commonly for wardriving, warflying, warwalking and warskating.

Latest release: 11 April 2011, version Kismet 2011-03-R2

12. OpenSSH/PuTTY/SSH

This is the go to tool for logging into and executing commands on a remote machine.

13. Burp Suite

This is a tool that is used for attacking web applications. The limited version is available for free, while the pro version costs $299.

Latest release: 3 June 2011, version 1.4.01

14. Nikto

This is an open source web server that performs tests against other web servers for multiple items. This includes more than 6,400 potentially dangerous files/CGIs and other checks.

Latest release: 20 February 2011, version 2.1.4

15. Hping

You can use this one to send custom TCP, ICMP and UDP packets and then display replies. The tool was inspired by the ping command but can be used to perform far more controlled probes.

Latest release: 5 November 2005, version hping3-20051105

16. Ettercap

If a man in the middle attack on LAN networks is what you’re looking at then Ettercap is the tool that you need.

Latest release: 22 March 2013, version 0.7.6-Locard

17. Sysinternals

This tool can be used to gain access to a number of small windows utilities that can be used for low-level windows hacking.

Latest release: 4 February 2011

18. w3af

This is a powerful framework that is used for searching and exploiting web application vulnerabilities.

Latest release: 11 October 2011, version 1.1

19. OpenVAS

This is a vulnerability scanner that was forked from Nessus. The last free version of Nessus, before it became a proprietary tool in 2005, was used for this.

Latest release: 17 April 2013, version 6.0

20. Scapy

Interactive packer manipulation, network scanning, packet generating, packet sniffing, are the activities that Scapy excels in. It is a low level tool and you need Python to interact with it.

Latest release: 28 February 2011, version 2.2.0

20. Ping/telnet/dig/traceroute/whois/netstat

This is a basic security auditing tool that is still very useful. You may be ignoring these for other high tech tools, but knowing these is important too.

21. THC Hydra

This is one tool that has been revered for brute force cracking on temote authentication services. The application can manage rapid dictionary attacks against over 30 protocols like https, ftp, http, telnet, smb, a number of databases and others.

Latest release: 23 May 2012, version 7.3

22. Perl/Python/Ruby

Secripting languages allow you to write your own canned security tools. You can also use them to modify existing tools.
no rating Paros proxy (#24, 8)

23. Paros proxy

This is a Java-based web proxy server that can be used for finding out the web vulnerabilities.

Latest release: 8 August 2006, version 3.2.13

24. NetStumbler

This is a Windows tool that can be used for finding open wireless access points. It is free but not open source and is a Windows-only application.

Latest release: 1 April 2004, version 0.4.0

25. Google

You may think that this is a weird choice for a list like this. But you’re wrong. Google’s database can be is recognised as an important security tool by experts and penetration testers everywhere.

26. OSSEC HIDS

This performs log analysis, rootkit detection, integrity checking, time-based alerting and active response. It is also used as a SEM/SIM solution/

Latest release: 16 November 2012, version 2.7

27. WebScarab

This tool records requests and responses that it observes and lets the operator review them in different ways. It is a tool that can expose the functioning of HTTP(S)-based applications.

Latest release: 20 August 2010, version 20100820-1632

28. Core Impact

This tool is considered by many to be the most powerful exploitation tool that is available right now. It is also much more expensive than others though.

Latest release: 8 August 2011, version 12

29. sqlmap

This is an open source penetration testing tool, which can be used in order to automate the detection and exploitation of SQL injection flaws.

Latest release: 11 April 2011, version 0.9

30. TrueCrypt

This is a very useful open source disk encryption system for Mac, Windows and Linux-based systems.

Latest release: 7 February 2012, version 7.1a 


Author :Shivam Kotwalia, CodeKill

No comments:

Post a Comment

Labels

Tutorial (129) Tech News (83) E-Books (55) Pdf (47) Hacking (46) Linux (32) Android (23) Programming (22) Tools (22) Video (21) Ethical Hacking (16) Electronics (12) Google (10) Hacked (9) Python (9) Facebook (8) Java (8) Software (8) PHP (7) Android App (6) C (6) Free Online Coureses (6) OpenSource (6) Ubuntu (6) Unix (6) Windows (6) C++ (5) Game Programming (5) Java Programming (5) Kali Linux (5) CodeKill (4) Cryptography (4) Firefox (4) JavaScript (4) Linux System Administrator (4) Mac (4) Penetration testing (4) Python Programming (4) Security (4) Top Distros (4) WhatsApp (4) CSS (3) Circuit (3) Cloud Computing (3) Game Devlopment (3) Hacking Tools (3) Malware (3) MicroController (3) Microsoft (3) Networking Tool (3) Perl (3) Source Code (3) WebSite (3) Windows 8.1 (3) C Programming (2) C Series (2) C# (2) CheetSheet (2) Computer (2) Computer Networking (2) Data Storage (2) Dual Boot (2) Eclipse (2) Edward Snowden (2) Exploit (2) Facts (2) Games On Linux (2) Google Chrome (2) HTML5 (2) Hacking Challenges (2) IDE's (2) Information Security (2) Lenovo (2) Linux Kernel (2) Malicious (2) Mobile (2) Motorola (2) Mozilla (2) MySQL (2) NoSQL (2) Raspberry Pi (2) Ruby (2) Security Tools (2) Syrian Electronic Army (2) Tricks and Tips (2) Valentine Day (2) Web Design (2) iOS (2) iPhone (2) jQwery (2) *nix (1) 2014 (1) 3D Modeling (1) Algorithm (1) Android Hacking (1) Android Pattern Lock Screen.. (1) Anonymous Mail (1) Anti-Spam (1) Apps (1) Arduino (1) Artificial Intelligance (1) Audio Software (1) BSD (1) BeAWARE (1) Bitcoin (1) Black Hat Hackers (1) BlackBerry (1) Buffer Overflow (1) C++ vs Java (1) CISO (1) Circuit Analysis (1) Circuit Design (1) Circuit Programming (1) Circuit Simulators (1) Codes (1) Crptology (1) Cryptanalysis (1) DDOS (1) Devlopers (1) Drupal (1) DuckDuckGo Search Engine (1) E-Card (1) E-Mails (1) Embedded System (1) Encryption Tools (1) Error (1) FTP (1) Famous Passwords (1) FileZilla (1) Flipkart (1) Forbes (1) Forgot Password (1) GCHQ (1) Genders (1) Gmail (1) Google Tricks and Trips (1) HTML (1) Hacking Distro (1) Hard Disk (1) Hash Encryption (1) Illegal (1) Internet (1) LAMP (1) Language Theory (1) LibreOffice (1) Linus Trovalds (1) Logic Gates (1) MATLAB (1) MOSFET (1) Mail (1) Mark Zuckerberg (1) Mathematical (1) MicroProcessor (1) Mind Mapping Tools (1) Myntra (1) NoSQL Database (1) Nobal Prize (1) Nokia (1) Object Oriented Programming (1) Office (1) Oldboot (1) Online (1) Paranoid Android (1) Passwords (1) Passwords Cracking Tools (1) PayPal (1) Perl Programming (1) Plugins (1) Prolog Programming (1) Python Basics (1) Remote (1) SEA (1) SQL Injection (1) Sans (1) Screencasts (1) Screenloggers (1) Server Load (1) Servers (1) Shell (1) Software Design (1) Software Developer (1) Software Testing (1) Sony (1) Spider.io (1) Statistical (1) Steve Jobs (1) TCP/IP (1) Timeline (1) Tor (1) Trojan (1) Ubuntu Phones (1) VAIO (1) Virus (1) Web Designers (1) Wi-Fi Hacking (1) Windows Tools (1) Windows XP (1) WordPress (1) XML (1) Yahoo (1) YouTube (1) cpp (1) eBay (1) iBanking (1)