Some hacker tools illustrated




Here is a review of some important hacker tools. Lots of other tools can be found at protectivehacks.com store Most hackers use these tools to execute their missions.


A list of underground hack sites and forums have these tools too.



Easy-hide-ip

Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the internet from a different location. never revealing your real location.

Proxies(proxy servers)

Normally, when a request is made on the internet, the end server is contacted directly. A proxy stands as an interface between your request and the server which your request is been made to. Your pc contacts it, and it makes the request on your behalf. When the end server gets the request and replies to the proxy, it sends the reply back to you. No direct contact occurs between you and the final destination, the proxy servers information is seen by the site instead of yours. As you learn about proxies, you’ll discover that, they are not allowed for some websites. You are asked to show your identification. But its rare

According to www.Wikipedia.org,

A proxy server has these potential purposes;

    It keeps machines behind it anonymous (mainly for security).
    To apply access policy to network services or content, e.g. to block undesired sites.
    To log / audit usage, i.e. to provide company employee Internet usage reporting.
    To bypass security/ parental controls.
    To scan transmitted content for malware before delivery.
    To circumvent regional restrictions.


Most of these hacker tools can be found and downloaded using google and other search engines.


For more on proxies, go here



For finding of wireless network, you can use;

Network Stumbler(NetStumbler)–easily finds wireless signals being broadcast within range. It also has ability to determine Signal/Noise info that can be used for site surveys.
Kismet –Kismet will detect and display Service set identifier(SSIDs)that are not being broadcast which is very critical in finding wireless networks.
Airsnort –can be used to sniff and crack WEP keys CowPatty –used as a brute force tool for cracking WPA-PSK, its the New WEP for home Wireless Security.
ASLeap –can be used to gather the original data that is being passed across a network at a particular time, if its using LEAP and these sniffed credentials can be cracked.

Port scanners
Superscan; constitutes of port scanner, pinger, and resolver
Angry IP Scanner : IP address and port scanner

Unicorn scan: Used for information gathering and correlation.
Sniffer
A sniffer is a program that is used for monitoring and analyzing network traffic, problems and detection of bottlenecks. Examples are, Tcpdump, airsport, kismet, Wireshark(Ethereal), Dsniff, Ettercap, Cain and Abel.
Nmap(Network Mapper")
It's used to discover computers and services on a computer network thereby creating a map of the network. It can be used to know, the types of operating system, firewalls a target is using and can scan large networks etc. It can be used on Windows, Linux and Mac.

    Wireshark(Ethereal): Ethereal can scan wireless and ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.


Spyrecon is also another password theft device. Google it or to get a copy

And, more

Most hackers are considered dreadful because, they have a good knowledge of these hacker tools and some programming languages. While the normal computer user dont.

Know of more tools and what they are used for?

The tools are incomplete I want you to add to the list!

[ ? ]

Upload 1-4 Pictures or Graphics (optional)[ ? ]

 

Click here to upload more images (optional)

Author Information (optional)

To receive credit as the author, enter your information below.

(first or full name)

(e.g., City, State, Country)

Submit Your Contribution

 submission guidelines.


(You can preview and edit on the next page)

What Other Visitors Have Said

Click below to see contributions from other visitors to this page...

TOOLS OF TRADE 
TROJANS The most dangerous as well as mostt used by some crackers and hackers are RATS(remote administration tool). what are rats rats are trojans …

Tool Not rated yet
Metasploit :The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds …

Click here to write your own.




Hacker tools what is hacking computer security hacking tutorials















----------------------------

Custom Search

----------------------------
Wholesale Security products at affordable rates.

Lots of affordable computer products.

----------------------------

How website building pay my bills

Infopublishing
How do I pay my bills by only providing information without hacking.

Come to think of it, I pay webhosting fee, sit on the computer adding content to my site and a lot of other activities.

Look at it this way, facebook, myspace, twitter, yahoo are trying to get better by the minute.

why....?

They earn from the information and services they provide. How is that possible….?


click here for more

Infopublishing