So this is not a countdown on which is the best one, but is a one which tells, which of the software are best in their own area.
- Wireshark
Wireshark is an open source packet analyzer program developed by Wireshark and is a cross platform application. Used for network troubleshooting, analysis and communication protocaol development.
Wireshark is a very similar to tcpdump, but has a graphical user interface, plus some great filtering options.
The features supported by Wireshark are
-from the wire data capture
-live data capturing from Ethernet, IEEE 802.11, PPP and loopback
-captured network data can be browsed from GUI as well as terminal, with the TShark
-data display can be refined using a display feature
-plug-in can be created for new protocols
-VoIP calls can be captured using proper encoding and detection
- Aircrack-ng
Aircrack –ng is a open source cross platform program developed by Thomas d’Otreppe for Packet sniffer and injector ,WEP encryption key recovery and is GPL licensed software.
Aircrack –ng is a network software suite consisting of detectors, packet sniffing, WEP and WPA/WPA-PSK cracker and analysis tool. Major features include
-crack WEP and WPA keys
-decrypts WEP and WPA encrypted capture files
-packet injector
-packet sniffer
- Virtual tunnel interface creator
-virtual access to different wireless cards from other computer.
NOTE: FOR USING WIRESHARK AND AIRCRACK-NG ONE NEED SOME SPECIAL WIRELESS CARDS CAPABLE OF GATHERING PACKETS. GOOGLE TO FIND AIRCRACK COMPARABLE WIRELESS CARDS.
- Backtrack Linux
Backtrack Linux is security and penetration testing giant in information security field .Backtrack is a distribution based on Debian GNU/Linux distribution mainly aimed at digital forensic and penetration testing. It is preloaded with all security tools including wireshark, aircrack-ng, Kismet, ophcrack, Nmap and so on. Backtrack focuses on 12 major categories on information security. The latest release are named as BACKTRACK 5R3 and Kali 1.0.
- Metaspoit
It is software which aims at computer security project and provides information on security vulnerabilities and aims at penetration testing and signature development.
It comes with various editions including framework edition, community edition, express and pro.
- VMware workstation
VMware workstation is a hypervisor that runs on *64 computers and enables users to set up multiple virtual machines and use them simultaneously. VMware Workstation allows multiple operating systems to run simultaneously.It is developed by VMware Inc. a division of EMC Corporation. The latest workstation 9 is released and sold.
- Kismet
Kismet is an 802.11 layer2 wireless network detector sniffer and intrusion network system. it works with about any wireless card and is fully supported.
- Nmap
Nmap is a classic high speed TCP port scanner. It offers tools for network exploration and security auditing and it supports large network without breaking a sweat. It is free and open source and is very dynamic and easy to use by a newbie or a pro.
- Nessus
Nessus is a remote network security auditor to test security modules and find vulnerabilities. Nessus is also the most used network security auditor.
- Nikto
Nikto is a open source web server scanner which performs test against web servers, it is also a great CGI scanner it also have other tools to focus on fingerprinting and Google hacking/info gathering.
- TcpDump
TcpDump is a powerful tool for network monitoring and data acquisition. It is used to dump traffic from a particular network. It can also be used to track network problems and detect attacks like “ping”.
- Netcraft
Netcraft is an online tool to scan websites OS and web server information.
- Netcat
Netcat is a simple UNIX utility which reads and writes data across network connections using TCP and UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. It is also a good network debugging and exploration tool since it can create almost any kind of correction.
- The list of other software according to the use are given below
DOMAIN
Sam Spade
Whois Lookup
Visual Route
NETWORK
Firewalk
Hping2
Ngrep
TcpDump
Sguil
WEB-SITE
Grab-a-site
Netcraft
Paros Proxy
VULNERABILITY IDENTIFICATION
GETTING ACCESS
Crack/Libcrack
Etherea
L0pht Crack
Sniffit
Snort
FIREWALLS
8signs
eSafe
McAfee Firewall
ZoneAlarm
OTHER TOOLS
IPFilter
Libnet
LogCheck
SARA
Retina
Tripwire
Post a Comment