List of all windows kali linux packages9/28/2023 ![]() ![]() BetterCAP: Another great tool for performing man in the middle attacks against a network.Wireshark performs general packet filtering by using display filters, including the one to grab a captured password. Wireshark: This is another great and widely used network analyzer tool for auditing security.Now when a user connects to the wireless network, an authentication window pops up, and the user enters the password, which is then captured henceforth! Fluxion: This is like the creation of a clone of the target Wi-Fi network.Aircrack-NG suite: As the name suggests that this is a suite, a scanner, WEP and WPA/WPA2-PSK cracker, a packet sniffer and an analysis tool is threaded together to carry out tasks to crack or identify vulnerabilities in any wireless mediums! This tool consists of 16 sub-tools to carry on with the utility.For carrying on with this, we might need to find a website that is SQL injection vulnerable, for which another tool discussed above, SQLiv, will come in handy! SQLMap: This is one of the most widely used tools for database assessment as the process of detection and exploitation of vulnerabilities present in SQL injection, which can lead to taking over of database.It takes care of identifying the hash type, customization cracker and many such more and that too in offline mode! John the Ripper: Another widely used offline password cracking service that combines a lot of password crackers into a single package.With a standard character set or with a specified one, all sort of permutation and combination is generated for the utility of password attacks. Crunch: This tool is like a utility that allows users to create custom wordlists.Let’s say we receive an encrypted text it is put through hash-identifier to figure out the hash type attached to it and then later findmyhash cracks the data to its original string. Along with his tool, another tool named findmyhash is used for cracking the data using online services. Hash-identifier: This tool helps users in the identification of various hashes that are used for the encryption of data and passwords.This tool has the capability to scan for 6500+ files or programs, which can be potentially dangerous. Nikto: One of the common tools used for assessing vulnerability and security threats. ![]() OWASP-ZAP: This is a Java based tool for testing the web application’s security which promises an intuitive GUI to perform tasks that include fuzzing, spidering, scripting etc., along with the presence of a number of plugins to ease of the task in hand.BurpSuite: This is another addition to the web application analysis, which itself comprises of a collection of tools that are bundled to form a single suite of web application’s security testing starting from the scratch, i.e.This is one of the few ones in the list that doesn’t come pre-installed in Kali Linux distribution but is still the most widely used! SQLiv: This tool is one of the most common ones used for simple and massive vulnerability scanner of SQL injection.A dictionary-based attack is launched with a set of preconfigured lists of words, and the response is analyzed to find the hidden gem! Dirbuster: As the name signifies, this tool is to bust hidden objects, files or even directories present in a website.Options are present, which notifies of each open port available on the target. Nmap: Another frequently used tool is Nmap that is used for network discovery and auditing of security.To help WhatWeb, there are 1800 plugins, each having their own utility. ![]() ![]() It is analogous to an interrogation agent who tries to interrogate a website in getting answers to what that website is built of.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |