A slideshow of the top tools hackers use to snoop, swipe, and attack corporate systems
Image: iStock / TeamOktopus
Hacking grabs headlines because it's very easy to visualize shadowy cabals of nefarious Bad Guys perched behind glowing monitors pecking at secret sauce software that will soon cripple your network, or swipe critical corporate data.
To be clear, this does happen every day. Corporate and SMB networks are at risk at all times of being penetrated and exploited. However, with a few exceptions, hacking teams rarely conspire in the shadows. Most groups function more like businesses that rely on time-tested software to achieve tactical goals.
SEE: Enterprise encryption: Trends, strategic needs, and best practices (Tech Pro Research story)
"Magic bullet" software does not exist. There is no single app that will be used to attack, or help defend all desktop, mobile, and IoT networks. Instead, a suite of open source and commercial software is used to map networks, sniff packets, and crack passwords. These are the most widely used exploitation tools.
- How to safely access and navigate the Dark Web (TechRepublic)
- Review: 'Down the Deep Dark Web' is a movie every technologist should watch (TechRepublic)
- 10 things you didn't know about the Dark Web (ZDNet)
- Stolen data on the dark web is cheaper than you might think (ZDNet)
- How Squarespace became a multimillion dollar publishing giant (TechRepublic)
- From Russia with Tech: The top 5 most interesting Russian startups(TechRepublic)
- Election Tech: Leadership is more powerful than technology (TechRepublic)
Dan Patterson has nothing to disclose. He does not hold investments in the technology companies he covers.
Dan is a Senior Writer for TechRepublic. He covers cybersecurity and the intersection of technology, politics and government.