Ethical Hacking Tools You Can

Embed Size (px)

Citation preview

  • 8/2/2019 Ethical Hacking Tools You Can

    1/3

    Ethical Hacking Tools You Can't Live Without

    As a professional ethical hacker, your toolkit is the most critical item you can possess other than hands-on

    experience and common sense. Your hacking tools should consist of the following (and make sure you're never

    caught on the job without them):

    Password cracking software, such as ophcrack and Proactive Password Auditor

    Network scanning software, such as SuperScan and Nmap

    Network vulnerability scanner, such as LANguard and QualysGuard

    Network analyzer software, such as OmniPeek and AirMagnet WiFi Analyzer

    File search software, such as FileLocator Pro and Identity Finder Professional

    Web application vulnerability scanner, such as Acunetix Web Vulnerability Scanner and WebInspect

    Database security scanner, such as SQLPing3 and AppDetectivePro

    Exploit software, such as Metasploit

    Common Security Weaknesses that Hackers Target

    Ethical hackers should know the common security weaknesses that hackers and malicious users first check for when

    hacking into networks and applications. Security flaws, such as the following, should be on your checklist when you

    perform your tests:

    Gullible and overly trusting users

    Unsecured building and computer room entrances

    Discarded documents that have not been shredded and computer disks that have not been destroyed

    Network perimeter with no firewall

    Poor, inappropriate, or missing file and share access controls

    Unpatched systems

    Web applications with weak authentication mechanisms

    Wireless systems running with default settings and without WEP, WPA, or WPA2 enabled

    Laptop computers and smartphones with no drive encryption and/or power-on passwords

    Weak or no application, database, and operating system passwords

    Firewalls, routers, remote access, and dialup devices with default or easily guessed passwords

    Commonly Hacked Ports

  • 8/2/2019 Ethical Hacking Tools You Can

    2/3

    Common ports, such as HTTP (80), are likely well secured but other ports may get overlooked and be vulnerable

    to hackers. In your ethical hacking tests, be sure to check these commonly hacked TCP and UDP ports:

    TCP port 21 - FTP (File Transfer Protocol)

    TCP port 23 - telnet

    TCP port 25 - SMTP (Simple Mail Transfer Protocol)

    TCP and UDP port 53 - DNS (Domain Name System)

    TCP ports 80 and 443 - HTTP (Hypertext Transport Protocol) and HTTPS (HTTP over SSL)

    TCP port 110 - POP3 (Post Office Protocol version 3)

    TCP and UDP port 135 - Windows RPC

    TCP and UDP ports 137139 - Windows NetBIOS over TCP/IP

    Tips for Successful Ethical Hacking

    Whether you're performing ethical hacking against a customer's systems or your own, you must be prudent and

    pragmatic to succeed. These tips for ethical hacking can help you succeed as an information security professional:

    Get permission in writingto perform your tests.

    Set goals and develop a plan before you get started.

    Have access to the right tools for the tasks at hand.

    Test at a time that's best for the business.

    Keep the key players in the loop during your testing.

    Understand that it's not possible to detect everysecurity vulnerability.

    Study malicious hacker and rogue insider behaviors and tactics. The more you know about how the bad guys

    work, the better you'll be at testing your systems for security vulnerabilities.

    Don't overlook nontechnical security issues; they're often exploited first.

    Make sure that all your testing is aboveboard.

    Treat other people's confidential information at least as well as you would treat your own.

    Bring vulnerabilities you find to the attention of management and implement the appropriate countermeasures.

    Don't treat every vulnerability discovered in the same manner. Not all weaknesses are bad. Evaluate the context of

    the issues found before you declare that the sky is falling.

    Show management and customers that security testing is good business. Ethical hacking is an investment to meet

    business goals, find what really matters, and comply with the various laws and regulations, not silly hacker games.

  • 8/2/2019 Ethical Hacking Tools You Can

    3/3

    Tools and Resources for Ethical Hacking

    Hackers are constantly updating their tools and finding new resources, so you need to keep your ethical hacking

    toolkit up to date, as well. Following is a sampling of some good tools and resources for ethical hacking. For more,

    visit thecomplete listof tools and resources, which covers Bluetooth, certifications, databases, Linux, laws and

    regulations, password cracking, and much more.

    Brutus(messaging tool)

    Cain & Abel(messaging tool)

    GFI LANguard(network tool)

    Google Hacking Database(Web application resource)

    Metasploit(exploit tool)

    NetStumbler(wireless network tool)

    OmniPeek(wireless network tool)

    ophcrack(password cracking tool)

    QualysGuard(Windows tool)

    RainbowCrack(password cracking tool)

    SecureIIS(system hardening tool)

    Wireless Vulnerabilities and Exploits(wireless network tool)

    http://www.dummies.com/how-to/content/ethical-hackers-guide-to-tools-and-resources.htmlhttp://www.dummies.com/how-to/content/ethical-hackers-guide-to-tools-and-resources.htmlhttp://www.dummies.com/how-to/content/ethical-hackers-guide-to-tools-and-resources.htmlhttp://www.hoobie.net/brutushttp://www.hoobie.net/brutushttp://www.oxid.it/cain.htmlhttp://www.oxid.it/cain.htmlhttp://www.gfi.com/lannetscanhttp://www.gfi.com/lannetscanhttp://johnny.ihackstuff.com/ghdbhttp://johnny.ihackstuff.com/ghdbhttp://www.metasploit.com/http://www.metasploit.com/http://www.netstumbler.com/http://www.netstumbler.com/http://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzerhttp://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzerhttp://ophcrack.sourceforge.net/http://ophcrack.sourceforge.net/http://www.qualys.com/http://www.qualys.com/http://project-rainbowcrack.com/http://project-rainbowcrack.com/http://www.eeye.com/html/products/secureiis/index.htmlhttp://www.eeye.com/html/products/secureiis/index.htmlhttp://www.wve.org/http://www.wve.org/http://www.wve.org/http://www.eeye.com/html/products/secureiis/index.htmlhttp://project-rainbowcrack.com/http://www.qualys.com/http://ophcrack.sourceforge.net/http://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzerhttp://www.netstumbler.com/http://www.metasploit.com/http://johnny.ihackstuff.com/ghdbhttp://www.gfi.com/lannetscanhttp://www.oxid.it/cain.htmlhttp://www.hoobie.net/brutushttp://www.dummies.com/how-to/content/ethical-hackers-guide-to-tools-and-resources.html