• Top Hacking Softwares Used By Hackers.

    Kali Linux Is a Best Operating System used for Penetration Testing by Ethical Hackers.
    But it is also misused by Black hats. It consist about  200 inbuilt penetration Tools .
    You can use Kali Linux and Window both OS in one system by the use of virtual box or Vmware software.
    You can also make your system double boot, but in this way you can’t use both operating system at one time.



    But If you are in window you can Use These Tools:

    Burpsuire 
    Present for both Windows and Linux.

    Wireshark
    It is also present for both Windows and Linux. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.

    Ophcrack
    Ophcrack is a password cracking software which are based on rainbow tables.itruns on various operating systems like MAC OS, Unix/Linux, Windows.

    Rainbowcrack
    RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers.

    Aircrack
    Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. Aircrack-ng is a set of tools for auditing wireless networks.

    Kismet
    Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet also supports plugins which allow sniffing other media such as DECT.

    FireSheep
    Firesheep has a packet sniffer which can intercept the cookies which are encrypted from Social Media sites like Twitter and Facebook and comes with the Firefox web browser. Firesheep is available for both the Windows and Mac OS X operating system.

    Airjack
    AirJack is a device driver (or suit of device drivers) for 802.11(a/b/g) raw frame injection and reception.

    WepLap
    Weplab is a tool designed to teach how the Wired Equivalent Privacy (WEP) wireless encryption protocol works, explain the security vulnerabilities in the protocol, and demonstrate attacks that can be used to compromise a WEP protected wireless network.
  • 0 comments:

    একটি মন্তব্য পোস্ট করুন

    GET FREE HELP NOW

    I am ready for help. Do you want any help meet me.

    ADDRESS

    Bera-Pabna, 6680

    EMAIL

    amerahul10.khan@blogger.com
    rk427261@gmail.com

    TELEPHONE


    MOBILE

    +195 478 6680
    +171 060 9671