

Cain & AbelĬain & Abel is a password recovery tool for Microsoft Operating Systems. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. The amount of gathered data about each host can be saved to TXT, XML, CSV, or IP-Port list files. In order to increase the scanning speed, it uses multithreaded approach, wherein a separate scanning thread is created for each scanned IP address.Īngry IP Scanner simply pings each IP address to check if it’s alive, and then, it resolves its hostname, determines the MAC address, scans ports, etc.

It can be freely copied and used anywhere. Angry IP ScannerĪngry IP scanner is a lightweight, cross-platform IP address and port scanner. Burp can be easily configured and it contains features to assist even the most experienced testers with their work. It has various tools that work in collaboration to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.īurp is easy to use and provides the administrators full control to combine advanced manual techniques with automation for efficient testing. Run spot checks on the exploitability of vulnerabilitiesīrowse exploit modules and run individual exploits on hostsīurp Suite is a popular platform that is widely used for performing security testing of web applications. With Metasploit, you can perform the following operations −Ĭonduct basic penetration tests on small networks Matasploit can be used with command prompt or with Web UI. It’s a product of Rapid7 and most of its resources can be found at: It comes in two versions − commercial and free edition. Metasploit is one of the most powerful exploit tools. Nmap runs on all major computer operating systems such as Windows, Mac OS X, and Linux. What type of firewalls are in use, and other such characteristics.

What operating systems they are running on, Network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap was originally designed to scan large networks, but it can work equally well for single hosts. It is an open source tool that is used widely for network discovery and security auditing. In this chapter, we will discuss in brief some of famous tools that are widely used to prevent hacking and getting unauthorized access to a computer or network system.
