Sunday, August 30, 2020

Linux.Agent Malware Sample - Data Stealer



Research: SentinelOne, Tim Strazzere Hiding in plain sight?
Sample credit: Tim Strazzere


List of files

9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malware
d507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malware
fddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-pretty
ec5d4f90c91273b3794814be6b6257523d5300c28a492093e4fa1743291858dc  script.decompiled-raw
4d46893167464852455fce9829d4f9fcf3cce171c6f1a9c70ee133f225444d37  script.dumped

malware_a3dad000efa7d14c236c8018ad110144
malware fcbfb234b912c84e052a4a393c516c78
script.decompiled-pretty aab8ea012eafddabcdeee115ecc0e9b5
script.decompiled-raw ae0ea319de60dae6d3e0e58265e0cfcc
script.dumped b30df2e63bd4f35a32f9ea9b23a6f9e7


Download


Download. Email me if you need the password


More information

  1. Hacking Tools For Kali Linux
  2. Hak5 Tools
  3. Pentest Tools List
  4. Hacker Tools Online
  5. Hacker Tools For Mac
  6. Hacking Tools For Windows Free Download
  7. Best Hacking Tools 2019
  8. Hack Tools For Mac
  9. Computer Hacker
  10. Hacker Tools For Pc
  11. Physical Pentest Tools
  12. Hak5 Tools
  13. Hack Tools For Windows
  14. Hacking Tools For Windows
  15. Hack Website Online Tool
  16. Game Hacking
  17. Tools For Hacker
  18. What Are Hacking Tools
  19. Hack Tools Github
  20. Hack Tool Apk
  21. Wifi Hacker Tools For Windows
  22. Pentest Tools For Ubuntu
  23. Pentest Tools Alternative
  24. Hacker Tools Online
  25. Hacker Tools 2020
  26. Hacking Tools Windows
  27. Hacking Tools Software
  28. Hacking Tools For Windows 7
  29. Hack Tools For Pc
  30. Tools For Hacker
  31. Usb Pentest Tools
  32. Hack Tools Mac
  33. Pentest Tools Open Source
  34. Hacking Tools For Windows Free Download
  35. Pentest Tools Website Vulnerability
  36. Pentest Automation Tools
  37. Best Hacking Tools 2020
  38. Hacking App
  39. Growth Hacker Tools
  40. Hack Tools
  41. Physical Pentest Tools
  42. Pentest Tools For Ubuntu
  43. Pentest Tools Port Scanner
  44. Hack Tools Pc
  45. Nsa Hacker Tools
  46. Hack Tool Apk
  47. Hack Tools For Games
  48. Hack Tools Download
  49. Physical Pentest Tools
  50. Hacker Tools Github
  51. World No 1 Hacker Software
  52. Hacker Techniques Tools And Incident Handling
  53. Hack Tools For Pc
  54. Pentest Recon Tools
  55. Hack Tools Github
  56. Hacking Tools For Beginners
  57. Pentest Reporting Tools
  58. Tools Used For Hacking
  59. Hack Tool Apk
  60. Hacking Tools And Software
  61. Physical Pentest Tools
  62. Hacking Tools Windows 10
  63. New Hacker Tools
  64. Pentest Tools Nmap
  65. Pentest Tools Github
  66. Hack Tools Mac
  67. Hack Rom Tools
  68. Hacking Tools
  69. Github Hacking Tools
  70. Hacking Tools For Kali Linux
  71. Hacker Tools 2020
  72. Hack Tools
  73. Hacker Tools For Mac
  74. Free Pentest Tools For Windows
  75. Hacker Tools
  76. Pentest Tools Alternative
  77. New Hack Tools
  78. Pentest Tools For Mac
  79. Hack And Tools
  80. Hacking Tools Hardware
  81. Hack And Tools
  82. Hackers Toolbox
  83. Hack Tool Apk No Root
  84. Pentest Recon Tools
  85. Hacking Tools For Mac
  86. Hacker Tools For Ios
  87. Hack Apps
  88. New Hack Tools
  89. Tools For Hacker
  90. Hacker Tools Apk Download
  91. Nsa Hacker Tools
  92. What Is Hacking Tools
  93. How To Install Pentest Tools In Ubuntu
  94. Pentest Tools For Ubuntu
  95. Hacker Tools For Pc
  96. Hack Tools For Pc
  97. Pentest Tools Alternative
  98. Bluetooth Hacking Tools Kali
  99. Top Pentest Tools
  100. Hacker Security Tools
  101. Hacker Techniques Tools And Incident Handling
  102. Bluetooth Hacking Tools Kali
  103. Ethical Hacker Tools
  104. Pentest Tools Online
  105. Hackrf Tools
  106. Pentest Tools Linux
  107. Hack App
  108. Nsa Hack Tools
  109. Hack Website Online Tool
  110. Hacker Tools Apk Download
  111. Hack Website Online Tool
  112. Hacker Tools Hardware
  113. Underground Hacker Sites
  114. Hack Tools Online
  115. Hacker Tools Hardware
  116. Hacking Tools Online
  117. Hacker Tools Mac
  118. Hacking Tools Windows 10
  119. Hack Rom Tools
  120. Pentest Tools Port Scanner
  121. Pentest Tools For Android
  122. Pentest Tools For Ubuntu
  123. Hacker Security Tools
  124. Pentest Tools For Ubuntu
  125. Hacking Tools Windows 10

Linux Command Line Hackery Series: Part 1




In this concise article we will learn some basics of how to use Linux Command line, so lets get started.

Requirements:

1. An open Terminal in your Linux Box. I'm using Kali Linux 2.0
or you can check out this amazing website Webminal

Command:  ls
Syntax:         ls [flag(s)]
Function:      ls is short for list. ls command is used to list the contents of a directory these contents include files, folders, and links. ls has many optional flags as well, some of them are described below
Flags:    -a this flag is used to view hidden files that is those files whose names are preceded                      by a '.'(dot)
               -l  this flag is used to view file permissions, owner of the file, group of the owner, the                        file size, the modification date, and the filename. We'll talk more about it in later                            articles.

Command:  mkdir
Syntax:         mkdir dirname
Function:      mkdir is used to create a directory (or a folder) with the name which is followed by the command

now lets create a directory in our current directory named as myfiles, how would you do that?

mkdir myfiles

which command should we use in order to verify that the directory has been created in our current folder?

ls

this will list all the files and directories in our current folder. Do you see myfiles directory listed?

Command:  cd
Syntax:         cd path/to/directory
Function:      cd is short for change directory. It is used to navigate directories, or to make it clear it does the same thing as what double clicking on a folder do except it doesn't show you contents of the directory :(. In order to navigate or visit another directory we need to provide it's ABSOLUTE-PATH or RELATIVE-PATH you heard that, didn't ya?

Paths are of two types relative path or absolute path (also called full-path). Relative as the name suggests is relative to the current directory, so if you have to navigate to a folder within the current directory you'll just simply type cd directory_name. But what if you have to navigate to a directory which is the parent of current directory? Well it's easy just type cd .. (yes double dots, you noticed that .. and . thing when you typed ls -a, didn't you?). The double dots mean the directory above current directory (i,e the parent directory) and a single dot means the current directory (i,e the directory that I'm currently in). Now if you have to navigate two directories above current directory using relative path navigation you'll type

cd ../.. 

here .. means previous directory and another .. after slash (/) means the previous directory of the previous directory sounds confusing..!

The Absolute Path means full path to the file or folder which starts from root directory. Say I want to navigate to my home folder using absolute path, then I'll type:

cd /home/user

where user is the username
Now think of navigating to the myfiles folder from your home directory using the absolute path, it will be something like this:

cd /home/user/myfiles

Exercise: Create a directory project1 inside your home directory and inside the project1 directory create a file and a directory named index.html and css respectively. Then navigate to the css directory and create a style.css file inside it. At last navigate out of the css directory to home both using the relative and absolute path mechanisms.

[Trick: To get quickly out of any directory to your home directory type cd ~ [press Enter] or simply cd [press Enter]]

Command:  touch
Syntax:         touch filename
Function:      touch is a nifty little function used to create an empty file (actually it's used to change access time of a file but everyone has got bad habits :P ). You can create any type of empty file with the touch command. If you are a bit curious about touch read the manual page of the touch command using the man touch command.

Now lets create a few files inside of our myfiles directory

touch file1 file2 file3

The above command creates three empty files in our current directory named file1, file2, and file3.
How will you verify that it has indeed created these three files in your current directory? I won't answer this time.

Command:  echo
Syntax:         echo Hacker manufacturing under process
Function:      echo is used to display a line of text. By default echo displays a line of text on the terminal which is the standard output device (stdout for short). However we can redirect the output of an echo command to a file using > (the greater than symbol).
Now if we have to echo a line of text to a file, say file1 in our myfiles directory, we will type:

echo This is file1 > file1

The above command will echo the text "This is file1" to file1.

Command:  cat
Syntax:         cat filename [anotherfilename...]
Function:      cat stands for concatenate (not that puny little creature in your house). The main function of cat is to concatenate files and display them on your terminal (or in geeky terms stdout). But its also used to display the contents of a file on your terminal.

Let's display the contents of file1 in the myfiles directory that we echoed to it using the echo command, for that we'll type:

cat file1

Awesome I can see on black screen contents of my file (what if your terminals background is white?), looks like I'm becoming a hacker. In case you don't see it then I suggest you should give up the thought of becoming a hacker. Just kidding you might have missed a step or two from the above steps that we performed.

Now lets say that we want to add another line of text to our file using the echo command should we use the same greater than (>) symbol? No, if we want to add another line (which in geeky terms is to append a line) to our file using the echo command we have to use >> (two greater than symbols) like this:

echo Another line of text >> file1

now to check the contents of file1 we'll type:

cat file1

OK we wrote two lines inside of the file1.
Does it mean we have to add three greater than symbols to write third line? Oh! I didn't thought you'd be such a genius.

A single greater than symbol (>) means redirect the output of the preceding command to a file specified after the > symbol. If the file exists then overwrite everything that's in it with the new contents and if the file does not exist then create one and write to it the output of the preceding command. So if you had typed

echo Another line of text > file1

it would have overwritten the contents of the file1 with "Another line of text" and the line "This is file1" would no longer be present in the file.

Two greater than symbols (>>) mean that append (remember the geeky term?) the output of the previous command to the end of file specified after >>. Now if you want to add another line of text to file1, you won't use >>> rather you'll use >> like this:

echo Third line in file1 >> file1

This is it for today. But don't worry we'll learn more things soon.

Related word

  1. Pentest Reporting Tools
  2. Bluetooth Hacking Tools Kali
  3. Hacker Tools Mac
  4. Hak5 Tools
  5. Pentest Automation Tools
  6. Termux Hacking Tools 2019
  7. Hacking Tools For Windows
  8. Hacking Tools
  9. How To Make Hacking Tools
  10. Install Pentest Tools Ubuntu
  11. Hacker Tools Online
  12. Pentest Tools Framework
  13. Hacker
  14. Pentest Tools Subdomain
  15. Hacker Tools Linux
  16. Pentest Reporting Tools
  17. Pentest Tools Bluekeep
  18. Pentest Tools Alternative
  19. Tools Used For Hacking
  20. Wifi Hacker Tools For Windows
  21. Hack Tools
  22. Best Pentesting Tools 2018
  23. Hacking Tools Kit
  24. Hacker Tools Software
  25. Pentest Tools Github
  26. Beginner Hacker Tools
  27. Hacking Tools Name
  28. Hacker Tools Software
  29. Pentest Tools For Mac
  30. Pentest Tools List
  31. Underground Hacker Sites
  32. Hacking Tools For Beginners
  33. Pentest Tools
  34. Hack Tools
  35. Hacker Tools Mac
  36. Best Hacking Tools 2019
  37. Hack Tools For Ubuntu
  38. Pentest Tools Bluekeep
  39. Top Pentest Tools
  40. Hacking Tools Github
  41. Termux Hacking Tools 2019
  42. Hack And Tools
  43. Nsa Hacker Tools
  44. Hack Apps
  45. Pentest Tools Website
  46. How To Make Hacking Tools
  47. Hack Tools For Pc
  48. Beginner Hacker Tools
  49. Tools For Hacker
  50. Pentest Reporting Tools
  51. Hackers Toolbox
  52. Hacking Tools For Windows 7
  53. Growth Hacker Tools
  54. Pentest Tools Website Vulnerability
  55. Hack Tools For Games
  56. Beginner Hacker Tools
  57. Hack Tools
  58. Pentest Tools Github
  59. Hacker Tools Online
  60. Hacking Tools Online
  61. Kik Hack Tools
  62. Hacking Tools Download
  63. How To Install Pentest Tools In Ubuntu
  64. Hacking Tools Pc
  65. Hack Tools For Games
  66. Hacking Tools 2020
  67. Hack Tools Pc
  68. World No 1 Hacker Software
  69. Game Hacking
  70. Hack App
  71. Termux Hacking Tools 2019
  72. Hack Tools For Mac
  73. Pentest Tools Free
  74. Hacker Tools Free Download
  75. Hack Tool Apk No Root
  76. Hack Tools For Ubuntu
  77. Pentest Tools Port Scanner
  78. Hacker Tools Apk
  79. Best Hacking Tools 2020
  80. Pentest Tools Website
  81. Hacking Tools Pc
  82. Pentest Automation Tools
  83. Hacker Tools Online
  84. Install Pentest Tools Ubuntu
  85. World No 1 Hacker Software
  86. Pentest Tools Linux
  87. Hacking Tools And Software
  88. Hacking Tools Software
  89. Hack And Tools
  90. Ethical Hacker Tools
  91. Pentest Tools Tcp Port Scanner
  92. Install Pentest Tools Ubuntu
  93. Hack Tools Online
  94. Hacker Tools List
  95. Hacking Tools Mac
  96. Hack And Tools
  97. Hacker Techniques Tools And Incident Handling
  98. Hack Tools
  99. Free Pentest Tools For Windows
  100. Pentest Tools Free
  101. Hacking Tools Windows 10
  102. Hack Tools For Windows
  103. Hacker Tools Github
  104. Physical Pentest Tools
  105. Hacking Tools 2019
  106. Hack Tools 2019
  107. Hacking Tools Github
  108. Hacker Tools Software
  109. Wifi Hacker Tools For Windows
  110. Growth Hacker Tools
  111. Hacking Tools For Kali Linux
  112. Hacking Tools Hardware
  113. Hacker Tools Apk
  114. New Hacker Tools
  115. Beginner Hacker Tools
  116. Tools 4 Hack
  117. Hack Tools 2019
  118. Nsa Hack Tools
  119. Hack Tools Online
  120. Hacking Tools Name
  121. Pentest Tools
  122. Pentest Tools For Android
  123. Hackrf Tools
  124. Hacker Tools List
  125. Pentest Recon Tools
  126. Hacking Tools Download
  127. Hack Tools 2019
  128. Hackrf Tools
  129. Pentest Tools Linux
  130. Hacker Tools Software
  131. Pentest Tools Nmap
  132. Hacker Tools For Windows
  133. Hacking Tools
  134. Hacker Tools 2020
  135. Hacker Tools 2019
  136. Hacking Tools For Kali Linux
  137. Hacker Tools List
  138. Pentest Tools Android
  139. Hack Rom Tools
  140. Pentest Tools Port Scanner
  141. Hacking Tools Usb
  142. Hack Tools Online
  143. Hacker Tools Github
  144. Hacking Tools Mac
  145. Hacker Tools Apk Download
  146. Free Pentest Tools For Windows
  147. Pentest Tools Online
  148. Hack Tool Apk
  149. Hack Tools 2019
  150. Pentest Tools Windows
  151. Hak5 Tools
  152. Hacking Tools Free Download
  153. Hacking App
  154. Tools For Hacker
  155. Pentest Tools Bluekeep
  156. Nsa Hacker Tools
  157. Blackhat Hacker Tools
  158. Kik Hack Tools
  159. Hack Tools For Windows
  160. Hacking Tools Name
  161. Physical Pentest Tools

Top 10 Most Popular Ethical Hacking Tools (2019 Ranking)

     Top 10 powerful Hacking  Tools in 2019.       

If hacking is performed to identify the potential threats to a computer or network then it will be an ethical hacking.

Ethical hacking is also called penetration testing, intrusion testing, and red teaming.

Hacking is the process of gaining access to a computer system with the intention of fraud, data stealing, and privacy invasion etc., by identifying its weaknesses.

Ethical Hackers:

A person who performs the hacking activities is called a hacker.

There are six types of hackers:

  • The Ethical Hacker (White hat)
  • Cracker
  • Grey hat
  • Script kiddies
  • Hacktivist
  • Phreaker

A security professional who uses his/her hacking skills for defensive purposes is called an ethical hacker. To strengthen the security, ethical hackers use their skills to find vulnerabilities, document them, and suggest the ways to rectify them.

Companies that provide online services or those which are connected to the internet, must perform penetration testing by ethical hackers. Penetration testing is another name of ethical hacking. It can be performed manually or through an automation tool.

Ethical hackers work as an information security expert. They try to break the security of a computer system, network, or applications. They identify the weak points and based on that, they give advice or suggestions to strengthen the security.

Programming languages that are used for hacking include PHP, SQL, Python, Ruby, Bash, Perl, C, C++, Java, VBScript, Visual Basic, C Sharp, JavaScript, and HTML.

Few Hacking Certifications include:

  1. CEH
  2. GIAC
  3. OSCP
  4. CREST

Let's Explore!!

#1) Nmap

Nmap

Price: Free

Description:

Nmap is a security scanner, port scanner, as well as a network exploration tool. It is an open source software and is available for free.

It supports cross-platform. It can be used for network inventory, managing service upgrade schedules, and for monitoring host & service uptime. It can work for a single host as well as large networks. It provides binary packages for Linux, Windows, and Mac OS X.

Features: 

  • Nmap suite has:
    • Data transfer, redirection, and debugging tool(Ncat),
    • Scan results comparing utility(Ndiff),
    • Packet generation and response analysis tool (Nping),
    • GUI and Results viewer (Nping)
  • Using raw IP packets it can determine:
    • The available hosts on the network.
    • Their services offered by these available hosts.
    • Their OS.
    • Packet filters they are using.
    • And many other characteristics.

Best for: Nmap is best for scanning network. It is easy to use and fast as well.

Website: Nmap

******************

#2) Netsparker

Netsparker Vulnerability-Assessments-and-Penetration-Tests

Netsparker is a dead accurate ethical hacking tool, that mimics a hacker's moves to identify vulnerabilities such as SQL Injection and Cross-site Scripting in web applications and web APIs. 
 
Netsparker uniquely verifies the identified vulnerabilities proving they are real and not false positives, so you do not need to waste hours manually verifying the identified vulnerabilities once a scan is finished.
 
It is available as a Windows software and an online service.

******************

#3) Acunetix 

Acunetix Dashboard

Acunetix is a fully automated ethical hacking tool that detects and reports on over 4500 web application vulnerabilities including all variants of SQL Injection and XSS.

The Acunetix crawler fully supports HTML5 and JavaScript and Single-page applications, allowing auditing of complex, authenticated applications.

It bakes in advanced Vulnerability Management features right-into its core, prioritizing risks based on data through a single, consolidated view, and integrating the scanner's results into other tools and platforms.

=> Visit Acunetix Official Website

******************

#4) Metasploit

Metasploit

Price: Metasploit Framework is an open source tool and it can be downloaded for free. Metasploit Pro is a commercial product. Its free trial is available for 14 days. Contact the company to know more about its pricing details.

Description:


It is the software for penetration testing. Using Metasploit Framework, you can develop and execute exploit code against a remote machine. It supports cross-platform.

Features: 

  • It is useful for knowing about security vulnerabilities.
  • Helps in penetration testing.
  • Helps in IDS signature development.
  • You can create security testing tools.

Best For Building anti-forensic and evasion tools.

Website: Metasploit

#5) Aircrack-Ng

aircrack-ng

Price: Free

Description:

Aircrack-ng provides different tools for evaluating Wi-Fi network security.

All are command line tools. For Wi-Fi security, it focuses on monitoring, attacking, testing, and cracking. It supports Linux, Windows, OS X, Free BSD, NetBSD, OpenBSD, Solaris, and eComStation 2.

Features:


  • Aircrack-ng can focus on Replay attacks, de-authentication, fake access points, and others.
  • It supports exporting data to text files.
  • It can check Wi-Fi cards and driver capabilities.
  • It can crack WEP keys and for that, it makes use of FMS attack, PTW attack, and dictionary attacks.
  • It can crack WPA2-PSK and for that, it makes use of dictionary attacks.

Best For: Supports any wireless network interface controller.

Website: Aircrack-Ng

#6) Wireshark

Wireshark

Price: Free

Description:

Wireshark is a packet analyzer and can perform deep inspection of many protocols.

It supports cross-platform. It allows you to export the output to different file formats like XML, PostScript, CSV, and Plaintext. It provides the facility to apply coloring rules to packet list so that analysis will be easier and quicker. The above image will show the capturing of packets.

Features:

  • It can decompress the gzip files on the fly.
  • It can decrypt many protocols like IPsec, ISAKMP, and SSL/TLS etc.
  • It can perform live capture and offline analysis.
  • It allows you to browse the captured network data using GUI or TTY-mode TShark utility.

Best For: Analyzing data packets.

Website: Wireshark

#7) Ettercap

Ettercap

Price: Free.

Description:

Ettercap supports cross-platform. Using Ettercap's API, you can create custom plugins. Even with the proxy connection, it can do sniffing of HTTP SSL secured data.

Features:

  • Sniffing of live connections.
  • Content filtering.
  • Active and passive dissection of many protocols.
  • Network and host analysis.

Best For: It allows you to create custom plugins.

Website: Ettercap

#8) Maltego

Maltego

Price: The Community version, Maltego CE is available for free. Price for Maltego Classic is $999. Price for Maltego XL is $1999. These two products are for the desktop. Price for the server products like CTAS, ITDS, and Comms starts at $40000, which includes training as well.

Description:

Maltego is a tool for link analysis and data mining. It supports Windows, Linux, and Mac OS.

For the discovery of data from open sources and visualizing the information in graphical format, it provides the library of transforms. It performs real-time data-mining and information gathering.

Features:

  • Represents the data on node-based graph patterns.
  • Maltego XL can work with large graphs.
  • It will provide you the graphical picture, thereby telling you about the weak points and abnormalities of the network.

Best For: It can work with very large graphs.

Website: Maltego

#9) Nikto

Nikto

Price: Free

Description:

Nikto is an open source tool for scanning the web server.

It scans the web server for dangerous files, outdated versions, and particular version related problems. It saves the report in a text file, XML, HTML, NBE, and CSV file formats. Nikto can be used on the system which supports basic Perl installation. It can be used on Windows, Mac, Linux, and UNIX systems.

Features:

  • It can check web servers for over 6700 potentially dangerous files.
  • It has full HTTP proxy support.
  • Using Headers, favicons, and files, it can identify the installed software.
  • It can scan the server for outdated server components.

Best For: As a Penetration Testing tool.

Website: Nikto

#10) Burp Suite

BurpSuite

Price: It has three pricing plans. Community edition can be downloaded for free. Pricing for Enterprise edition starts at $3999 per year. Price of the Professional edition starts at $399 per user per year.

Description:

Burp Suite has a web vulnerability scanner and has advanced and essential manual tools.

It provides many features for web application security. It has three editions, community, enterprise, and professional. With community editions, it provides essential manual tools. With the paid versions it provides more features like Web vulnerabilities scanner.

Features:

  • It allows you to schedule and repeats the scan.
  • It scans for 100 generic vulnerabilities.
  • It uses out-of-band techniques (OAST).
  • It provides detailed custom advisory for the reported vulnerabilities.
  • It provides CI Integration.

Best For: Security testing.

Website: Burp Suite

#11) John The Ripper

John-the-Ripper

Price: Free

Description:

John the Ripper is a tool for password cracking. It can be used on Windows, DOS, and Open VMS. It is an open source tool. It is created for detecting weak UNIX passwords.

Features:

  • John the Ripper can be used to test various encrypted passwords.
  • It performs dictionary attacks.
  • It provides various password crackers in one package.
  • It provides a customizable cracker.

Best For: It is fast in password cracking.

Website:  John the Ripper

#12) Angry IP Scanner

AngryIPScanner

Price: Free

Description:

Angry IP Scanner is a tool for scanning the IP addresses and ports. It can scan both on local network and Internet. It supports Windows, Mac, and Linux operating systems.

Features:

  • It can export the result in many formats.
  • It is a command-line interface tool.
  • It is extensible with many data fetchers.

Website:  Angry IP Scanner

Conclusion

As explained here, Nmap is used for computer security and network management. It is good for scanning the network. Metasploit is also for security and is good for building anti-forensic and evasion tools.

Aircrack-Ng is a free packet sniffer & injector and supports cross-platform. Wireshark is a packet analyzer and is good in analyzing data packets. As per the reviews available online, people recommend using Nmap instead of Angry IP scanner as Angry IP Scanner comes with unwanted applications.

John the Ripper is fast in password cracking. Nikto is a good open source tool for penetration testing. Maltego presents the data in a graphical form and will give you information about weak points and abnormalities.

This was all about the ethical hacking and the top ethical hacking tools. Hope you will find this article to be much useful!!

@EVERYTHING NT

Related word