Solved

Ethical Hacking Tools

Posted on 2014-10-14
5
293 Views
Last Modified: 2014-10-15
Hello experts,

I'm looking for a list of ethical hacking tools.  I'm primarly interested in Data Penetration Tools, but would also like to look at other types.

Can I get some recommendations of tools I should look at?

I need to present a list for work in a couple days.

Thanks,
Brandon
0
Comment
Question by:bdfallon
5 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 165 total points
Comment Utility
The most used would probably be Metasploit, see here: http://www.metasploit.com/
0
 
LVL 19

Assisted Solution

by:helpfinder
helpfinder earned 165 total points
Comment Utility
you can use Kali (formerly Backtrack) distro which is made for doing things like penetration testing and contains various tools for this
0
 

Author Comment

by:bdfallon
Comment Utility
Thank you both.  Are there any others you think I should consider?
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 170 total points
Comment Utility
Check out Backtrack, Nikto, Nessus, Nexpose, Paros, ike, SARA, burp, skipfish, metasploit, kali, openvas, nmap, Google Gruyere ..etc, Kali Linux is by far the best, it's an excellent linux distro with an excellent source of testing tools
http://www.concise-courses.com/security/top-ten-pentesting-tools/
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines

To have a full scope of security assessment, you need to have experience with both the network and application side.
0
 

Author Closing Comment

by:bdfallon
Comment Utility
Thank you very much for your help!
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
OfficeMate Freezes on login or does not load after login credentials are input.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now