Solved

Ethical Hacking Tools

Posted on 2014-10-14
5
300 Views
Last Modified: 2014-10-15
Hello experts,

I'm looking for a list of ethical hacking tools.  I'm primarly interested in Data Penetration Tools, but would also like to look at other types.

Can I get some recommendations of tools I should look at?

I need to present a list for work in a couple days.

Thanks,
Brandon
0
Comment
Question by:bdfallon
5 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 165 total points
ID: 40379858
The most used would probably be Metasploit, see here: http://www.metasploit.com/
0
 
LVL 19

Assisted Solution

by:helpfinder
helpfinder earned 165 total points
ID: 40379863
you can use Kali (formerly Backtrack) distro which is made for doing things like penetration testing and contains various tools for this
0
 

Author Comment

by:bdfallon
ID: 40380606
Thank you both.  Are there any others you think I should consider?
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 170 total points
ID: 40380927
Check out Backtrack, Nikto, Nessus, Nexpose, Paros, ike, SARA, burp, skipfish, metasploit, kali, openvas, nmap, Google Gruyere ..etc, Kali Linux is by far the best, it's an excellent linux distro with an excellent source of testing tools
http://www.concise-courses.com/security/top-ten-pentesting-tools/
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines

To have a full scope of security assessment, you need to have experience with both the network and application side.
0
 

Author Closing Comment

by:bdfallon
ID: 40382127
Thank you very much for your help!
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
Need to grow your business through quality cloud solutions? With everything required to build a cloud platform and solution, you may feel like the distance between you and the cloud is quite long. Help is here. Spend some time learning about the Con…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now