Hacking tool

A hacking tool is a program designed to assist with hacking, or a piece of software which can be used for hacking purposes and save hackers time.

Examples include Nmap, Nessus, John the Ripper, p0f, and Winzapper.[1] Bribes have also been described as among the most potent hacking tools, due to their potential exploitation in social engineering attacks.[2] Occasionally, common software such as ActiveX is exploited as a hacking tool as well.[3][4]

Hacking tools such as Cain and Abel, however, are well known as Script Kiddie Tools. Script kiddies are people who follow instructions from a manual, without realising how it happens. These Script Kiddies have been an enormous threat to computer security as there are many hacking tools and keyloggers up for download which are free.

Worms

Main article: Computer worm

Another example of a hacking tool is a computer worm. These malicious programs detect vulnerabilities in operating systems. Not all worms, however, are malicious. The Nachi Worms have actually fixed operating system vulnerabilities by downloading and installing security patches from the Microsoft website.

Port Scanners

Main article: Port scanner

Port scanners detect vulnerabilities in firewalls, and are able to find a great deal about the computer system, such as the operating system, ISP, wireless routers and how long the system has been online. However, port scanners are the best security auditing tools.

Hacking Linux

Although not much is said about threats to the Linux system, they do exist and could increase in the future. One of the biggest threats to the Linux system is given by the so-called Rootkits. These are programs that have special privileges and are able to hide to the system administrator.

See also

References

  1. "Top 15 Security/Hacking Tools and Utilities". 23 July 2007. Archived from the original on 11 February 2014.
  2. New hacking tool: chocolate, Munir Kotadia, Zdnet, Apr. 20, 2004.
  3. ActiveX used as hacking tool, CNet, Feb. 7, 1997.
  4. The basics of hacking and penetration testing: ethical hacking and penetration testing made easy, Engebretson, Pat (Patrick Henry), 1974- Call NumberPublisherEdition Waltham, MA : Elsevier, 2010.

External links

This article is issued from Wikipedia - version of the 11/12/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.