Solved

Ethical Hacking Tools

Posted on 2014-10-14
5
307 Views
Last Modified: 2014-10-15
Hello experts,

I'm looking for a list of ethical hacking tools.  I'm primarly interested in Data Penetration Tools, but would also like to look at other types.

Can I get some recommendations of tools I should look at?

I need to present a list for work in a couple days.

Thanks,
Brandon
0
Comment
Question by:bdfallon
5 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 165 total points
ID: 40379858
The most used would probably be Metasploit, see here: http://www.metasploit.com/
0
 
LVL 19

Assisted Solution

by:helpfinder
helpfinder earned 165 total points
ID: 40379863
you can use Kali (formerly Backtrack) distro which is made for doing things like penetration testing and contains various tools for this
0
 

Author Comment

by:bdfallon
ID: 40380606
Thank you both.  Are there any others you think I should consider?
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 170 total points
ID: 40380927
Check out Backtrack, Nikto, Nessus, Nexpose, Paros, ike, SARA, burp, skipfish, metasploit, kali, openvas, nmap, Google Gruyere ..etc, Kali Linux is by far the best, it's an excellent linux distro with an excellent source of testing tools
http://www.concise-courses.com/security/top-ten-pentesting-tools/
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines

To have a full scope of security assessment, you need to have experience with both the network and application side.
0
 

Author Closing Comment

by:bdfallon
ID: 40382127
Thank you very much for your help!
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Port Forwarding on Juniper SSG 140 Firewall 13 82
Mobile penetration testing 2 121
Cheap SSL Certificates 3 124
Work with App store 7 55
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question