Skip to content

TechRepublic

  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • Accounting
  • CRM
  • Academy
Resources
  • TechRepublic Premium
  • TechRepublic Academy
  • Newsletters
  • Resource Library
  • Forums
  • Sponsored
Go Premium
Popular Topics
  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • Accounting
  • CRM
  • Academy
  • Project Management
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
View All Topics
Go Premium
Security

The hacking toolkit: 13 essential network security utilities

By Dan Patterson August 11, 2016, 5:32 AM PDT

Image
1
of 12

istockteamoktopus.png
istockteamoktopus.png
The hacking toolkit: 13 essential network security utilities

A slideshow of the top tools hackers use to snoop, swipe, and attack corporate systems

Image: iStock / TeamOktopus

A slideshow of the top tools hackers use to snoop, swipe, and attack corporate systems

Image: iStock / TeamOktopus

Hacking grabs headlines because it’s very easy to visualize shadowy cabals of nefarious Bad Guys perched behind glowing monitors pecking at secret sauce software that will soon cripple your network, or swipe critical corporate data.

To be clear, this does happen every day. Corporate and SMB networks are at risk at all times of being penetrated and exploited. However, with a few exceptions, hacking teams rarely conspire in the shadows. Most groups function more like businesses that rely on time-tested software to achieve tactical goals.

SEE: Enterprise encryption: Trends, strategic needs, and best practices (Tech Pro Research story)

“Magic bullet” software does not exist. There is no single app that will be used to attack, or help defend all desktop, mobile, and IoT networks. Instead, a suite of open source and commercial software is used to map networks, sniff packets, and crack passwords. These are the most widely used exploitation tools.

Read more

  • How to safely access and navigate the Dark Web (TechRepublic)
  • Review: ‘Down the Deep Dark Web’ is a movie every technologist should watch (TechRepublic)
  • 10 things you didn’t know about the Dark Web (ZDNet)
  • Stolen data on the dark web is cheaper than you might think (ZDNet)
  • How Squarespace became a multimillion dollar publishing giant (TechRepublic)
  • From Russia with Tech: The top 5 most interesting Russian startups(TechRepublic)
  • Election Tech: Leadership is more powerful than technology (TechRepublic)
Image: iStock / TeamOktopus
The hacking toolkit: 13 essential network security utilities

The Social Engineer Toolkit

The Social Engineer Toolkit

Humans are often the weakest link in the security chain. The Social Engineer Toolkit is a suite of apps that will send spearfishing attacks, spoof SMS messages, and mask malware as media files.

Image: http://www.social-engineer.org

The hacking toolkit: 13 essential network security utilities

Metasploit

Metasploit

The world-famous Metasploit by Rapid7 is network penetration software for IT professionals and network managers that features updated exploit lists, as well as spearfishing, network mapping, and password brute force tools.

Image: Rapid7

The hacking toolkit: 13 essential network security utilities

Nmap

Nmap

Nmap is a great way to map a network. The free, open source auditing tool identifies network shape, and locates firewalls, IP filters, and other network ports.

Image: http://Nmap.org

The hacking toolkit: 13 essential network security utilities

Cain and Abel

Cain and Abel

Need to retrieve a lost a password? Cain and Abel will sniff your network, locate password files, then crack the encryption. The decryption app works with other types of locked files, including Wi-Fi passwords and cached voice conversations.

Image: http://www.oxid.it/

The hacking toolkit: 13 essential network security utilities

John the Ripper

John the Ripper

John the Ripper is a speedy, open source password decryption utility for Linux and Macs that can autodetect password hashes, then automatically apply a variety of attacks, including dictionary and brute force hacks.

Image: http://www.openwall.com/

The hacking toolkit: 13 essential network security utilities

Hash Suite

Hash Suite

Hash Suite is a fast and powerful password cracking application for Windows. The software isn’t free but is reasonably priced and, for SMBs in particular, worth the investment.

Image: http://openwall.net

The hacking toolkit: 13 essential network security utilities

Wireshark

Wireshark

Wireshark is a widely used packet sniffer that can identify, track, and visualize all network IP traffic.

Image: https://www.wireshark.org/

The hacking toolkit: 13 essential network security utilities

Ettercap

Ettercap

Ettercap is an unambiguous, unapologetic man-in-the-middle exploitation tool that can intercept IP traffic, grab passwords, and eavesdrop on network activity.

Image: https://ettercap.github.io

The hacking toolkit: 13 essential network security utilities

Burp Suite

Burp Suite

Need to manage your network and perform a number of security tests? Try the Burp, a comprehensive, modular, and automated network scanning application.

Image: https://portswigger.net

putty.png
putty.png
The hacking toolkit: 13 essential network security utilities

PuTTY

PuTTY

Ditch the kludgey Windows command line and communicate with servers and telnet securely using PuTTY, the popular, open source terminal emulator.

Image: http://www.putty.org/

The hacking toolkit: 13 essential network security utilities

Maltego

Maltego

Maltego is a network data mining, forensics, and link visualization tool developed by security firm Paterva.

Image: https://www.paterva.com

  • Security
  • Account Information

    Share with Your Friends

    The hacking toolkit: 13 essential network security utilities

    Your email has been sent

Share: The hacking toolkit: 13 essential network security utilities
Image of Dan Patterson
By Dan Patterson
Dan is a writer, reporter, and producer. He is currently a reporter for at CBS News and was previously a Senior Writer for TechRepublic.
  • Account Information

    Contact Dan Patterson

    Your message has been sent

  • |
  • See all of Dan's content

Daily Tech Insider

If you can only read one tech story a day, this is it.

Cybersecurity Insider

Stay abreast of the latest cybersecurity news, solutions, and best practices

TechRepublic TechRepublic
  • TechRepublic on Facebook
  • TechRepublic on X
  • TechRepublic on LinkedIn
  • TechRepublic on YouTube
  • TechRepublic on Pinterest
  • TechRepublic RSS
Services
  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers
Explore
  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • Editorial Policy
  • Legal Terms
  • Privacy Policy
© 2025 TechnologyAdvice. All rights reserved.
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
Use Facebook
Use Linkedin

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account
Use Facebook
Use Linkedin

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add [email protected] to your contacts list.

Back to Home Page
×