Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Security

The hacking toolkit: 13 essential network security utilities

By Dan Patterson August 11, 2016, 5:32 AM PDT

Image
1
of 12
Previous Next

istockteamoktopus.png
istockteamoktopus.png
The hacking toolkit: 13 essential network security utilities

A slideshow of the top tools hackers use to snoop, swipe, and attack corporate systems

Image: iStock / TeamOktopus

A slideshow of the top tools hackers use to snoop, swipe, and attack corporate systems

Image: iStock / TeamOktopus

Hacking grabs headlines because it’s very easy to visualize shadowy cabals of nefarious Bad Guys perched behind glowing monitors pecking at secret sauce software that will soon cripple your network, or swipe critical corporate data.

To be clear, this does happen every day. Corporate and SMB networks are at risk at all times of being penetrated and exploited. However, with a few exceptions, hacking teams rarely conspire in the shadows. Most groups function more like businesses that rely on time-tested software to achieve tactical goals.

SEE: Enterprise encryption: Trends, strategic needs, and best practices (Tech Pro Research story)

“Magic bullet” software does not exist. There is no single app that will be used to attack, or help defend all desktop, mobile, and IoT networks. Instead, a suite of open source and commercial software is used to map networks, sniff packets, and crack passwords. These are the most widely used exploitation tools.

Read more

  • How to safely access and navigate the Dark Web (TechRepublic)
  • Review: ‘Down the Deep Dark Web’ is a movie every technologist should watch (TechRepublic)
  • 10 things you didn’t know about the Dark Web (ZDNet)
  • Stolen data on the dark web is cheaper than you might think (ZDNet)
  • How Squarespace became a multimillion dollar publishing giant (TechRepublic)
  • From Russia with Tech: The top 5 most interesting Russian startups(TechRepublic)
  • Election Tech: Leadership is more powerful than technology (TechRepublic)
Image: iStock / TeamOktopus
The hacking toolkit: 13 essential network security utilities

The Social Engineer Toolkit

The Social Engineer Toolkit

Humans are often the weakest link in the security chain. The Social Engineer Toolkit is a suite of apps that will send spearfishing attacks, spoof SMS messages, and mask malware as media files.

Image: http://www.social-engineer.org

The hacking toolkit: 13 essential network security utilities

Metasploit

Metasploit

The world-famous Metasploit by Rapid7 is network penetration software for IT professionals and network managers that features updated exploit lists, as well as spearfishing, network mapping, and password brute force tools.

Image: Rapid7

The hacking toolkit: 13 essential network security utilities

Nmap

Nmap

Nmap is a great way to map a network. The free, open source auditing tool identifies network shape, and locates firewalls, IP filters, and other network ports.

Image: http://Nmap.org

The hacking toolkit: 13 essential network security utilities

Cain and Abel

Cain and Abel

Need to retrieve a lost a password? Cain and Abel will sniff your network, locate password files, then crack the encryption. The decryption app works with other types of locked files, including Wi-Fi passwords and cached voice conversations.

Image: http://www.oxid.it/

The hacking toolkit: 13 essential network security utilities

John the Ripper

John the Ripper

John the Ripper is a speedy, open source password decryption utility for Linux and Macs that can autodetect password hashes, then automatically apply a variety of attacks, including dictionary and brute force hacks.

Image: http://www.openwall.com/

The hacking toolkit: 13 essential network security utilities

Hash Suite

Hash Suite

Hash Suite is a fast and powerful password cracking application for Windows. The software isn’t free but is reasonably priced and, for SMBs in particular, worth the investment.

Image: http://openwall.net

The hacking toolkit: 13 essential network security utilities

Wireshark

Wireshark

Wireshark is a widely used packet sniffer that can identify, track, and visualize all network IP traffic.

Image: https://www.wireshark.org/

The hacking toolkit: 13 essential network security utilities

Ettercap

Ettercap

Ettercap is an unambiguous, unapologetic man-in-the-middle exploitation tool that can intercept IP traffic, grab passwords, and eavesdrop on network activity.

Image: https://ettercap.github.io

The hacking toolkit: 13 essential network security utilities

Burp Suite

Burp Suite

Need to manage your network and perform a number of security tests? Try the Burp, a comprehensive, modular, and automated network scanning application.

Image: https://portswigger.net

putty.png
putty.png
The hacking toolkit: 13 essential network security utilities

PuTTY

PuTTY

Ditch the kludgey Windows command line and communicate with servers and telnet securely using PuTTY, the popular, open source terminal emulator.

Image: http://www.putty.org/

The hacking toolkit: 13 essential network security utilities

Maltego

Maltego

Maltego is a network data mining, forensics, and link visualization tool developed by security firm Paterva.

Image: https://www.paterva.com

  • Security
  • Account Information

    Share with Your Friends

    The hacking toolkit: 13 essential network security utilities

    Your email has been sent

Share: The hacking toolkit: 13 essential network security utilities
Image of Dan Patterson
By Dan Patterson
Dan is a writer, reporter, and producer. He is currently a reporter for at CBS News and was previously a Senior Writer for TechRepublic.
  • Account Information

    Contact Dan Patterson

    Your message has been sent

  • |
  • See all of Dan's content

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire a Scrum Master

    Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  August 5, 2022, 5:00 PM PDT Modified:  August 7, 2022, 4:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Web 3.0 quick glossary

    Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

    Downloads
    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 1:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a User Experience Designer

    While the perfect color palette or the most sublime button shading or myriad of other design features play an important role in any product’s success, user interface design is not enough. Customer engagement and retention requires a strategic plan that attempts to measure, quantify and ultimately create a complete satisfying user experience on both an ...

    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 3:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice