With a standard character set or with a specified one, all sort of permutation and combination is generated for the utility of password attacks. Crunch: This tool is like a utility that allows users to create custom wordlists.Let’s say we receive an encrypted text it is put through hash-identifier to figure out the hash type attached to it and then later findmyhash cracks the data to its original string. Along with his tool, another tool named findmyhash is used for cracking the data using online services. Hash-identifier: This tool helps users in the identification of various hashes that are used for the encryption of data and passwords.This tool has the capability to scan for 6500+ files or programs, which can be potentially dangerous. Nikto: One of the common tools used for assessing vulnerability and security threats.OWASP-ZAP: This is a Java based tool for testing the web application’s security which promises an intuitive GUI to perform tasks that include fuzzing, spidering, scripting etc., along with the presence of a number of plugins to ease of the task in hand.BurpSuite: This is another addition to the web application analysis, which itself comprises of a collection of tools that are bundled to form a single suite of web application’s security testing starting from the scratch, i.e.This is one of the few ones in the list that doesn’t come pre-installed in Kali Linux distribution but is still the most widely used! SQLiv: This tool is one of the most common ones used for simple and massive vulnerability scanner of SQL injection.A dictionary-based attack is launched with a set of preconfigured lists of words, and the response is analyzed to find the hidden gem! Dirbuster: As the name signifies, this tool is to bust hidden objects, files or even directories present in a website.Options are present, which notifies of each open port available on the target. Nmap: Another frequently used tool is Nmap that is used for network discovery and auditing of security.To help WhatWeb, there are 1800 plugins, each having their own utility. It is analogous to an interrogation agent who tries to interrogate a website in getting answers to what that website is built of. WhatWeb: This utility enables the utility of information gathering and is like a website fingerprint.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |