Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

The hacking toolkit: 13 essential network security utilities

By Dan Patterson August 11, 2016, 5:32 AM PDT

Image
1
of 12

istockteamoktopus.png
istockteamoktopus.png
The hacking toolkit: 13 essential network security utilities

A slideshow of the top tools hackers use to snoop, swipe, and attack corporate systems

Image: iStock / TeamOktopus

A slideshow of the top tools hackers use to snoop, swipe, and attack corporate systems

Image: iStock / TeamOktopus

Hacking grabs headlines because it’s very easy to visualize shadowy cabals of nefarious Bad Guys perched behind glowing monitors pecking at secret sauce software that will soon cripple your network, or swipe critical corporate data.

To be clear, this does happen every day. Corporate and SMB networks are at risk at all times of being penetrated and exploited. However, with a few exceptions, hacking teams rarely conspire in the shadows. Most groups function more like businesses that rely on time-tested software to achieve tactical goals.

SEE: Enterprise encryption: Trends, strategic needs, and best practices (Tech Pro Research story)

“Magic bullet” software does not exist. There is no single app that will be used to attack, or help defend all desktop, mobile, and IoT networks. Instead, a suite of open source and commercial software is used to map networks, sniff packets, and crack passwords. These are the most widely used exploitation tools.

Read more

  • How to safely access and navigate the Dark Web (TechRepublic)
  • Review: ‘Down the Deep Dark Web’ is a movie every technologist should watch (TechRepublic)
  • 10 things you didn’t know about the Dark Web (ZDNet)
  • Stolen data on the dark web is cheaper than you might think (ZDNet)
  • How Squarespace became a multimillion dollar publishing giant (TechRepublic)
  • From Russia with Tech: The top 5 most interesting Russian startups(TechRepublic)
  • Election Tech: Leadership is more powerful than technology (TechRepublic)
Image: iStock / TeamOktopus
The hacking toolkit: 13 essential network security utilities

The Social Engineer Toolkit

The Social Engineer Toolkit

Humans are often the weakest link in the security chain. The Social Engineer Toolkit is a suite of apps that will send spearfishing attacks, spoof SMS messages, and mask malware as media files.

Image: http://www.social-engineer.org

The hacking toolkit: 13 essential network security utilities

Metasploit

Metasploit

The world-famous Metasploit by Rapid7 is network penetration software for IT professionals and network managers that features updated exploit lists, as well as spearfishing, network mapping, and password brute force tools.

Image: Rapid7

The hacking toolkit: 13 essential network security utilities

Nmap

Nmap

Nmap is a great way to map a network. The free, open source auditing tool identifies network shape, and locates firewalls, IP filters, and other network ports.

Image: http://Nmap.org

The hacking toolkit: 13 essential network security utilities

Cain and Abel

Cain and Abel

Need to retrieve a lost a password? Cain and Abel will sniff your network, locate password files, then crack the encryption. The decryption app works with other types of locked files, including Wi-Fi passwords and cached voice conversations.

Image: http://www.oxid.it/

The hacking toolkit: 13 essential network security utilities

John the Ripper

John the Ripper

John the Ripper is a speedy, open source password decryption utility for Linux and Macs that can autodetect password hashes, then automatically apply a variety of attacks, including dictionary and brute force hacks.

Image: http://www.openwall.com/

The hacking toolkit: 13 essential network security utilities

Hash Suite

Hash Suite

Hash Suite is a fast and powerful password cracking application for Windows. The software isn’t free but is reasonably priced and, for SMBs in particular, worth the investment.

Image: http://openwall.net

The hacking toolkit: 13 essential network security utilities

Wireshark

Wireshark

Wireshark is a widely used packet sniffer that can identify, track, and visualize all network IP traffic.

Image: https://www.wireshark.org/

The hacking toolkit: 13 essential network security utilities

Ettercap

Ettercap

Ettercap is an unambiguous, unapologetic man-in-the-middle exploitation tool that can intercept IP traffic, grab passwords, and eavesdrop on network activity.

Image: https://ettercap.github.io

The hacking toolkit: 13 essential network security utilities

Burp Suite

Burp Suite

Need to manage your network and perform a number of security tests? Try the Burp, a comprehensive, modular, and automated network scanning application.

Image: https://portswigger.net

putty.png
putty.png
The hacking toolkit: 13 essential network security utilities

PuTTY

PuTTY

Ditch the kludgey Windows command line and communicate with servers and telnet securely using PuTTY, the popular, open source terminal emulator.

Image: http://www.putty.org/

The hacking toolkit: 13 essential network security utilities

Maltego

Maltego

Maltego is a network data mining, forensics, and link visualization tool developed by security firm Paterva.

Image: https://www.paterva.com

  • Security
  • Account Information

    Share with Your Friends

    The hacking toolkit: 13 essential network security utilities

    Your email has been sent

Share: The hacking toolkit: 13 essential network security utilities
Image of Dan Patterson
By Dan Patterson
Dan is a writer, reporter, and producer. He is currently a reporter for at CBS News and was previously a Senior Writer for TechRepublic.
  • Account Information

    Contact Dan Patterson

    Your message has been sent

  • |
  • See all of Dan's content

TechRepublic Premium

  • TechRepublic Premium

    Hiring kit: Automation specialist

    PURPOSE Recruiting an automation specialist with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:48 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Cybersecurity engineer

    PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:18 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Business information analyst

    PURPOSE A large segment of internal and external modern business now takes place on computers, tablets and other mobile devices. The information technology infrastructure that has sprung up around that business can be daunting in its scope. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:51 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Grant writing guide

    PURPOSE This grant writing guide from TechRepublic Premium will help you identify a grant that fits your idea, build a team to help you compile a proposal, and set a timeline to meet the application deadline. From the guide: BEFORE YOU START This list of steps will help the grant writing process go more smoothly. ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 27, 2023, 6:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice