20 TOOLS FOR HACKING IN KALI LINUX


It's amazing how many people are interested in learning how to hack something in kali linux Could it be because they usually have a Hollywood like Mr. Robot impression on their minds?

However, we must to say thanks to the open source community, because of them, we can list 20 tools for hacking in kali linux to meet all your needs. Just remember to keep it ethical! and educational purpose only.

Most people are interested in pentesting and hacking because like magic from nothing becomes there. and how to manipulate data provided by computers and technology.

HERE IS THE BEST :

20 TOOLS FOR HACKING IN KALI LINUX


1. Metasploit Framework


Metasploit Framework is an open source framework where experts and security teams check security vulnerabilities and perform security assessments to improve security knowledge.


Credit : WikiMedia


It contains a large number of tools through which you can create security environments to test vulnerability and act as a penetration test system.

I ever see this tool running in android using termux but i don't know how may you ever see too.


2. Aircrack-ng


Aircrack-ng is one of the best wireless penetration tools for WEP/WAP/WPA2 crackers used worldwide!

It works by taking packets from the network, and analyzing them through retrieved passwords. It also has a console interface. In addition, the Aircrack-ng also uses standard FMS (Fluhrer, Mantin and Shamir) attacks, along with improvements like the Korek and PTW attacks to accelerate the attack, faster than WEP.

Aircrack-ng In Movies
Credit: Aircrack-ng


If you find it difficult to use Aircrack-ng, just check out the online tutorials.

Wi-Fi network security Aircrack-ng


3. THC Hydra


THC Hydra uses brute force attack to automatically decrypt any remote authentication service. Supports fast dictionary attacks for more than 50 protocols, including FTP, https, telnet, etc.

Credit: SecArtWork


You can use it to break web scanners, wireless networks, package builders, gmail, and so on.

Hidra - Login Cracker

4. WireShark


WireShark is an open source parser that you can use for free. However, you can see activities in the network from the microscopic level as well as access to pcap files, customizable reports, advanced triggers, alerts, etc.
Credit : Wikipedia

It is said to be the world's most widely used network protocol analyzer for Linux.

Wireshark Network Analyzer



5. John the Ripper


John the Ripper is another common tool used in the hacking community (and hacking). Initially developed for Unix systems, it is now available in more than 10 OS distributions.

It has a customizable cracker, automatic password fragmentation, brute force attack and dictionary attack (among other cracking modes).


Credit: Wikimedia


John The Ripper Password Cracker

6. NetCat


Netcat, usually abbreviated as nc, is a network utility through which you can use TCP / IP protocols to read and write data to network connections.


Credit : Wikimedia


You can use it to create any kind of connection, as well as to troubleshoot and debug networks using tunnel mode, port scanning, etc.

Netcat Network Analysis Tool


7. Nmap


Nmap (Network Mapper) is a free and open source utility that system administrators use to discover networks and review their security.

Kali Linux and Ubuntu - Which Distro is better to hack?


Credit : Wikimedia

It runs fast, well documented, contains graphical user interface, supports data transfer, network inventory, ect.

Discover Nmap Networks and Security Checking Tool

8. Nikto2


Nikto2 is a free and open source web scanner for fast and comprehensive web page testing. To do this, it looks for more than 6,500 potentially dangerous files, versions of legacy software, vulnerable server configurations, and server-specific issues.


Credit : Wikimedia

Nikto web server scanner



9. Maltego


Maltego is a monopolistic program, but it is widely used for open-source criminal research and search and intelligence. It is a utility to analyze GUI links that provide real-time data mining, as well as image information sets that use node-based graphics and multiple-order connections.

Maltego intelligence and forensic tool



10. Snort


Snort is a free and open source NIDS that can detect security holes on your computer.


Credit : Wikimedia

With it you can run traffic analysis, search / compare content, record packets in IP networks and detect a variety of network attacks, among other features, all in real time.

Snoring Tool to Prevent Intrusion Network



11. Yersinia


Yersinia, named for yersinia bacteria, is a network utility designed to exploit weak network protocols by simulating being a testing and analysis framework for secure network systems.

Credit : Kali

Provides attacks for IEEE 802.1Q, Fast Standby Routing Protocol (HSRP), Cisco Discovery Protocol (CDP), etc.

Yersinia network analysis tool



12. BeEF (Browser Framework)


BeEF, as the name suggests, is a breakthrough tool that focuses on browser vulnerabilities. However, you can evaluate the security of the target environment by using attack vectors from the side






13. Nessus Vulnerability Scanner


Nessus is a remote wipe tool that you can use to check your computers for security holes. This software does not effectively block the security holes in your computers, but you can detect them by running more than 1,200 vulnerability checks and trigger alerts if necessary to perform any security patch.


Credit : Wikimedia


Nessus Scanner Vulnerability

14. Kismet Wireless


Kismet Wireless is an intrusion detection system, a network detector, and a password detector. Works mostly with Wi-Fi (IEEE 802.11) networks and can have extended functionality using plug-ins.


Credit: Wikimedia


Wireless network detector Kismet



15. Hashcat


Hashcat is known in the security experts community among the fastest and oldest tool to restore and restore the password in the world. It is open source and has a kernel engine in the kernel, more than 200 fragmentation types, a built-in reference system, etc.

Hashcat password recovery tool



16. Burp  Suite Scanner


Burp Suite Scanner is an integrated professional GUI testing platform for testing security vulnerabilities for web applications.

Kali Linux and Ubuntu - Which Distro is better to hack?

It combines all test and penetration tools into a community version (free) and in a professional edition ($ 349 per user / year).

Security vulnerability burping scanner

Burst security vulnerability scanner



17.Pixiewps


Pixiewps is an offline utility that relies on brute force to exploit software applications with little or no entropy. It was developed by Dominique Bonjard in 2004 to use "futile attack" to educate students.

Depending on the strength of the passwords you are trying to decrypt, Pixiewps can do the task in seconds or minutes.

Currently PixieWPS brute force tool



18. Wifite2


Wifite2 is a free, open source, open-source Python wireless utility designed to work perfectly with pen test distributions. It's a complete rewrite of Wifite, so it offers improved performance.

Credit: Wikimedia


Do a good job of hiding and decrypting hidden decrypts, decrypting weak WEP passwords using a list of decryption techniques, etc.

Wifite Wireless Network Checking Tool



19. GNU Mac Changer


GNU MAC Changer is a network utility that makes it easier and faster to handle MAC addresses for network interfaces.

GNU Mac Changer

20. Fern Wifi Cracker


Fern Wifi Cracker is a Python-based wireless security tool to review network vulnerabilities. With it, you can break and restore WEP/WPA/WPS keys, as well as many network-based attacks on Ethernet-based networks.


Credit: Wikimedia




Clonclussion


Well, ladies and gentlemen, we've come to the end of our long list of penetration tests and hacking tools for Kali Linux.

All applications listed are current and still used today. If we lose your address, feel free to let us know in the comments section below.

Source and image from Fossmint, Wikipedia
Regards: LinuxergeeksMiripgeeks.
  • [message]
    • ##laptop## Support
      • Support Us by Disable your ad block.
      • thank you

COMMENTS

Name

7zip,1,Android,8,Android Emulator,1,APK,2,AppImage,1,Apple,3,APT,3,Arch,5,ASUS,1,Black Shark,1,BlueStack,1,Calculator,1,Cinnamon,1,Client,3,Code,3,Comic,1,Compression Tool,1,Debian,6,DELL,1,Desktop,2,Developers,3,Elementary OS,1,Encryption,1,FACEBOOK,1,Fedora,4,fix,2,Fortnite,1,Gadgets,4,Gamer,4,Gaming,1,geeks,11,GNOME,3,GNOME TWEAK TOOL,1,Google,2,Google Go,1,Hacking Tools,1,How To,19,IBM,1,IDE,1,Intel,1,iOS,4,iPads,1,Javascript,1,Kali Linux,1,KDE,2,Laptop,1,linux,24,Linux Mint,6,LXDE,1,Mac,2,MacOS,4,Manjaro,2,MATE,1,MX Linux,1,Network,3,NEWS,9,Open Source,16,OpenSuse,3,ParrotSec,1,Password,2,Programming,2,Programs,6,Repository,1,Review,2,ROG Phone,1,Security,4,Server,1,SmartPhone,3,SNAP,1,Snapd,1,Software,3,SONY,1,TECH,13,Text Editor,2,Torrent,1,tutorial,16,Ubuntu,10,Ubuntu Kylin,2,vim,1,VMware,1,VPN,1,Web Master,1,Whatsapp,1,Windows,5,Windows Phone,1,XFCE,1,Xiaomi,1,XPS,1,Zorin OS,1,
ltr
item
Linuxer Geeks: 20 TOOLS FOR HACKING IN KALI LINUX
20 TOOLS FOR HACKING IN KALI LINUX
https://upload.wikimedia.org/wikipedia/commons/d/d1/Metasploit_Framework.png
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsB7H-rKMRT-h3mAVYAFQBixegynHDijqPrYyyvb5b7T-_BlJgx8yuXCXPpIHoXev2kcMlBaOK27tl0NV_u7xEoPyKSvCXS5USuCOZ_s00jpWdeIrrMtYR3CHRneudI6lyOKp6vJgbNMA/s72-c/beEF.PNG
Linuxer Geeks
https://linuxergeeks.blogspot.com/2019/07/20-tools-for-hacking-in-kali-linux.html
https://linuxergeeks.blogspot.com/
https://linuxergeeks.blogspot.com/
https://linuxergeeks.blogspot.com/2019/07/20-tools-for-hacking-in-kali-linux.html
true
7822317774280320736
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy