Blogger Widget ....beware shocked.... Top five tools for hackers--- - ....beware shocked....

Wednesday, April 18, 2012

0 Top five tools for hackers---

1 Wire shark

2 Pro-rat

3 Nmap

4 Vm-ware workstation

5 SET (social engineering toolkit)



WIRESHARK- Mine favorite tool out of 5 tools. It times to investigate your network traffic. Several times it happens, when you install some software you doubt that it is sending your personal data or information to someone else. Wire shark is a tool that monitors your network packets and analyzes them where it’s sending data. Now how it’s helpful for you, Most Trojans and key-loggers sends logs using network and upload them to FTP or send them to some email address. Using wire shark you can monitor what they are sending and even the username and password of FTP and email accounts on which it is sending. This is the most promising factor that makes to love wire shark more.



PRO-RAT – Prorat has a server creator with features that allow it to be undetected by antivirus and firewall software, and also allow it to stealthily run in the background. The software runs completely (including root kit) in Windows 2000/XP, and such features include killing security software, removing and disabling system restore points, and displaying a fake error message to mislead the victims. 



NMAP-· Identifying hosts on a network. For ex- listing the hosts which respond to pings or have a particular port open. 



· Port Scanning - Enumerating the open ports on one or more target hosts.

· Version Detection - Interrogating listening network services listening on remote devices to determine the application name and version number.

· OS Detection - Remotely determining the operating system and some hardware characteristics of network devices.

VM-WARE- VMware software provides a completely virtualized set of hardware to the guest operating system. VMware software virtualizes the hardware for a video adapter, a network adapter, and hard disk adapters. The host provides pass-through drivers for guest USB, serial, and parallel devices. In this way, VMware virtual machines become highly portable between computers, because every host looks nearly identical to the guest. Click here to download vm-ware.

SET-Social engineering also known as human hack, social engineering is an act to manipulate human mind to get the desire goals. Social engineering is a general term and on daily life everyone implement it but usage of social engineering in hacking and penetration testing is little different. The main use of social engineering in hacking is to get the information, maintaining access and so on.

No comments:

Blogger Widgets