Hacking tool

Hacking tool

A hacking tool is a program designed to assist with hacking, or a legitimate utility that can also be used for hacking.

Examples

Examples include Nmap, Nessus, John the Ripper, SuperScan, p0f, and Winzapper. [ [http://www.teckh.com/?p=143 Top 15 Security/Hacking Tools and Utilities] , July 23, 2007.] Chocolate has also been designated as among the most potent hacking tools, due to its potential exploitation in social engineering attacks. [ [http://news.zdnet.com/2100-1009_22-5195282.html New hacking tool: chocolate] , Munir Kotadia, Zdnet, Apr. 20, 2004.] Occasionally, common software such as ActiveX is exploited as a hacking tool as well. [ [http://www.news.com/2100-1023-268947.html ActiveX used as hacking tool] , CNet, Feb. 7, 1997.]

Hacking tools such as Cain and Abel, however, are well known as Script Kiddie Tools. Script kiddies are people who follow instructions from a manual, without realising how it happens. These Script Kiddies have been an enormous threat to computer security as there are many hacking tools and keyloggers up for download and are free.

Worms

Another example of a hacking tool is a computer worm. These malicious programs detect vulnerabilities in operating systems. Not all worms, however, are malicious. The Nachi Worms have actually fixed operating system vulnerabilities by downloading and installing security patches from the Microsoft website.

Port Scanners

Port scanners detect vulnerabilities in firewalls, and are able to find a great deal about the computer system, such as the operating system, ISP, wireless routers and how long the system has been online. However, port scanners are the best security auditing tools.

References

External links

* [http://sectools.org/ Top 100 Network Security Tools] , Fyodor
* [http://www.ccc.de/updates/2008/stellungnahme202c?language=en Clause 202c of German penal code endangers German IT industry] , Chaos Computer Club


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • ROM hacking — is the process of modifying a video game ROM image to alter the game s graphics, dialogue, levels, gameplay, or other gameplay elements. This is usually done by technically inclined video game fans to breathe new life into a cherished old game,… …   Wikipedia

  • hand tool — any tool or implement designed for manual operation. * * * Introduction  any of the implements used by craftsmen in manual operations, such as chopping, chiseling, sawing, filing, or forging. Complementary tools, often needed as auxiliaries to… …   Universalium

  • Google hacking — is a term that refers to the art of creating complex search engine queries in order to filter through large amounts of search results for information related to computer security. In its malicious format it can be used to detect websites that are …   Wikipedia

  • Nmap — Security Scanner results of an Nmap scan Original author(s) Gordon Lyon (Fyodor) Initial release September, 1997 …   Wikipedia

  • John the Ripper — Infobox Software name = John the Ripper Jack, John the Ripper s mascot. caption = author = developer = Alexander Peslyak (Solar Designer) released = latest release version = 1.7.0.2 latest release date = release date|2006|03|23 latest preview… …   Wikipedia

  • Hacktool — est un logiciel malveillant utilisé par des hackers dans différents buts. Il inclut entre autres des balayeurs de port, des renifleurs, un enregistreur de frappe et des outils d envoi de pourriel (spam). On retrouve ce logiciel sous différents… …   Wikipédia en Français

  • INCA Internet — Co., Ltd. (주) 잉카인터넷 Type Public Industry Computer Software Founded Seoul, Republic of Korea (Jan 31 …   Wikipedia

  • Cisco Global Exploiter — is a hacking tool used to find and exploit vulnerabilities in Cisco Network systems. It is created by the Italian group called BlackAngels . CGE was discovered the first time on March, 2004. The tool has 14 known Cisco vulnerabilities ranging… …   Wikipedia

  • Yersinia (computing) — Yersinia is a network security/hacking tool for Unix like operating systems, designed to take advantage of some weakeness in different network protocols. Yersinia is considered one of the valuable and widely used security tools. As of 2008… …   Wikipedia

  • Epyx — Infobox Company company name = Epyx, Inc. company company type = Corporation foundation = 1978 (as Automated Simulations) (defunct 1993) location = San Francisco, California key people = Jim Connelley Jon Freeman area served = industry = Computer …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”