Solved

Ethical Hacking Tools

Posted on 2014-10-14
5
319 Views
Last Modified: 2014-10-15
Hello experts,

I'm looking for a list of ethical hacking tools.  I'm primarly interested in Data Penetration Tools, but would also like to look at other types.

Can I get some recommendations of tools I should look at?

I need to present a list for work in a couple days.

Thanks,
Brandon
0
Comment
Question by:bdfallon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 165 total points
ID: 40379858
The most used would probably be Metasploit, see here: http://www.metasploit.com/
0
 
LVL 19

Assisted Solution

by:helpfinder
helpfinder earned 165 total points
ID: 40379863
you can use Kali (formerly Backtrack) distro which is made for doing things like penetration testing and contains various tools for this
0
 

Author Comment

by:bdfallon
ID: 40380606
Thank you both.  Are there any others you think I should consider?
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 170 total points
ID: 40380927
Check out Backtrack, Nikto, Nessus, Nexpose, Paros, ike, SARA, burp, skipfish, metasploit, kali, openvas, nmap, Google Gruyere ..etc, Kali Linux is by far the best, it's an excellent linux distro with an excellent source of testing tools
http://www.concise-courses.com/security/top-ten-pentesting-tools/
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines

To have a full scope of security assessment, you need to have experience with both the network and application side.
0
 

Author Closing Comment

by:bdfallon
ID: 40382127
Thank you very much for your help!
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Extra security implementation for 2017 9 85
Need extreme network security for home 16 140
DHCP behind catalyst 3750 POE-48 2 84
RRAS on Windows Servers 13 50
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question