?
Solved

Ethical Hacking Tools

Posted on 2014-10-14
5
Medium Priority
?
349 Views
Last Modified: 2014-10-15
Hello experts,

I'm looking for a list of ethical hacking tools.  I'm primarly interested in Data Penetration Tools, but would also like to look at other types.

Can I get some recommendations of tools I should look at?

I need to present a list for work in a couple days.

Thanks,
Brandon
0
Comment
Question by:bdfallon
5 Comments
 
LVL 37

Accepted Solution

by:
Kimputer earned 660 total points
ID: 40379858
The most used would probably be Metasploit, see here: http://www.metasploit.com/
0
 
LVL 19

Assisted Solution

by:helpfinder
helpfinder earned 660 total points
ID: 40379863
you can use Kali (formerly Backtrack) distro which is made for doing things like penetration testing and contains various tools for this
0
 

Author Comment

by:bdfallon
ID: 40380606
Thank you both.  Are there any others you think I should consider?
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 680 total points
ID: 40380927
Check out Backtrack, Nikto, Nessus, Nexpose, Paros, ike, SARA, burp, skipfish, metasploit, kali, openvas, nmap, Google Gruyere ..etc, Kali Linux is by far the best, it's an excellent linux distro with an excellent source of testing tools
http://www.concise-courses.com/security/top-ten-pentesting-tools/
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines

To have a full scope of security assessment, you need to have experience with both the network and application side.
0
 

Author Closing Comment

by:bdfallon
ID: 40382127
Thank you very much for your help!
0

Featured Post

Get expert help—faster!

Need expert help—fast? Use the Help Bell for personalized assistance getting answers to your important questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How does someone stay on the right and legal side of the hacking world?
Spectre and Meltdown, how it affects me and my clients?
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question