KEMBAR78
Overview on hacking tools | PPTX
NAME: BHABANTA PADHAN
REGD.NO.: L1900502002
BRANCH: IT
SEMESTER: 6TH
JHARSUGUDA ENGINEERING
SCHOOL
CONTENT
1. WHAT IS HACKING AND HACKER?
2. WHAT ARE HACKING TOOLS?
3. TYPES OF HACKING TOOLS
4. SOME HACKING TOOLS NAME
5. ADVANTAGES
6. DISADVANTAGES
7. CONCLUSION
8. REFERENECE
WHAT IS HACKING AND HACKER?
 Hacking is the activity of identifying weaknesses in a
computer system or a network to exploit the security
to gain access to personal data or business data.
 The person who do hacking is known as Hacker.
 There are mainly three types of hacker:
i. White hat Hacker
ii. Black hat hacker
iii. Gray hat hacker
WHAT ARE HACKING TOOLS?
 Hacking Tools are computer programs and scripts
that help you find and exploit weaknesses in computer
systems, web applications, servers and networks.
 Using this the tester of the applications or the software
are find the error and bugs in that software or
application and find the way to fix them.
 This is also used in the cyber security .
TYPES OF HACKING TOOLS
 Website Hacking: Unauthorized access on web server and
database called website hacking.
 Network Hacking: Network Hacking means the collection
of information about a network by using different tools like
NS lookup, Telnet, Ping, Tracert, Netstat, etc. with the
intent to harm the network system and hamper its
operation.
 Email Hacking: Email hacking means getting
unauthorized access on an Email account with the intent to
steal sensitive information.
 Password Hacking: Password Hacking means recovering
passwords from a database without the consent of an
authorized password holders.
 Computer Hacking: Unauthorized access on computer
system to steal sensitive information.
SOME HACKING TOOLS NAME
Some hacking tools names are
1. Netsparker
2. Traceroute NG
3. Aircrack-NG
Lets discuss about these hacking tools
NETSPARKER
 Netsparker is an easy to use web application security
scanner that can automatically find SQL Injection,
XSS and other vulnerabilities in your web
applications and web services.
 It is available as on-premises and SAAS solution.
FEATURES OF NETSPARKER
 Dead accurate vulnerability detection with the unique
Proof-Based Scanning Technology.
 Minimal configuration required. Scanner automatically
detects URL rewrite rules, custom 404 error pages.
 REST API for seamless integration with the SDLC, bug
tracking systems etc.
 Fully scalable solution. Scan 1,000 web applications in
just 24 hours.
Download link:
https://www.netsparker.com/support/installing-
netsparker-standard/
TRACEROUTE NG
 Traceroute NG is application that enables you to
analyze network path. This software can identify IP
addresses, hostnames, and packet loss. It provides
accurate analysis through command line interface.
FEATURES OF TRACEROUTE NG
 It offers both TCP and ICMP network path
analysis.
 This application can create a txt logfile.
 Supports both IP4 and IPV6.
 Detect path changes and give you a notification.
 Allows continuous probing of a network.
Download link: https://www.solarwinds.com/free-
tools/traceroute-ng
AIRCRACK-NG
 Aircrack is one of the best, trustable, ethical
hacking tools in the market. It cracks vulnerable
wireless connections. It is powered by WEP WPA
and WPA2 encryption Keys.
FEATURES OF AIRCRACK-NG
 More cards/drivers supported
 Support all types of OS and platforms
 New WEP attack: PTW
 Support for WEP dictionary attack
 Support for Fragmentation attack
 Improved tracking speed
Download link: https://www.aircrack-
ng.org/downloads.html
ADVANTAGES
 To recover lost information, password from the
system.
 To perform penetration testing for finding
vulnerability to strengthen the computer system
and network security.
DISADVANTAGES
 It causes privacy violation.
 Due to this there may be hamper system
operation.
 Denial of service attacks may be possible
 Malicious attack on the computer system.
 There may be security breach.
 Get many vulnerability that causes stealing of
sensitive information
CONCLUSION
There are several of hacking tools are available in the
internet for different purpose like some are for web
applications, some are for networks and many more
but the main use these tools is for error and bugs
detection in the web page, web application.networks
etc .
REFERENCE
All about these hacking tools and many other are
explain in this link:
https://www.guru99.com/learn-everything-about-
ethical-hacking-tools-and-skills.html
Overview on hacking tools

Overview on hacking tools

  • 1.
    NAME: BHABANTA PADHAN REGD.NO.:L1900502002 BRANCH: IT SEMESTER: 6TH JHARSUGUDA ENGINEERING SCHOOL
  • 2.
    CONTENT 1. WHAT ISHACKING AND HACKER? 2. WHAT ARE HACKING TOOLS? 3. TYPES OF HACKING TOOLS 4. SOME HACKING TOOLS NAME 5. ADVANTAGES 6. DISADVANTAGES 7. CONCLUSION 8. REFERENECE
  • 3.
    WHAT IS HACKINGAND HACKER?  Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data.  The person who do hacking is known as Hacker.  There are mainly three types of hacker: i. White hat Hacker ii. Black hat hacker iii. Gray hat hacker
  • 4.
    WHAT ARE HACKINGTOOLS?  Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks.  Using this the tester of the applications or the software are find the error and bugs in that software or application and find the way to fix them.  This is also used in the cyber security .
  • 5.
    TYPES OF HACKINGTOOLS  Website Hacking: Unauthorized access on web server and database called website hacking.  Network Hacking: Network Hacking means the collection of information about a network by using different tools like NS lookup, Telnet, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.  Email Hacking: Email hacking means getting unauthorized access on an Email account with the intent to steal sensitive information.  Password Hacking: Password Hacking means recovering passwords from a database without the consent of an authorized password holders.  Computer Hacking: Unauthorized access on computer system to steal sensitive information.
  • 6.
    SOME HACKING TOOLSNAME Some hacking tools names are 1. Netsparker 2. Traceroute NG 3. Aircrack-NG Lets discuss about these hacking tools
  • 7.
    NETSPARKER  Netsparker isan easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services.  It is available as on-premises and SAAS solution.
  • 8.
    FEATURES OF NETSPARKER Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology.  Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages.  REST API for seamless integration with the SDLC, bug tracking systems etc.  Fully scalable solution. Scan 1,000 web applications in just 24 hours. Download link: https://www.netsparker.com/support/installing- netsparker-standard/
  • 9.
    TRACEROUTE NG  TracerouteNG is application that enables you to analyze network path. This software can identify IP addresses, hostnames, and packet loss. It provides accurate analysis through command line interface.
  • 10.
    FEATURES OF TRACEROUTENG  It offers both TCP and ICMP network path analysis.  This application can create a txt logfile.  Supports both IP4 and IPV6.  Detect path changes and give you a notification.  Allows continuous probing of a network. Download link: https://www.solarwinds.com/free- tools/traceroute-ng
  • 11.
    AIRCRACK-NG  Aircrack isone of the best, trustable, ethical hacking tools in the market. It cracks vulnerable wireless connections. It is powered by WEP WPA and WPA2 encryption Keys.
  • 12.
    FEATURES OF AIRCRACK-NG More cards/drivers supported  Support all types of OS and platforms  New WEP attack: PTW  Support for WEP dictionary attack  Support for Fragmentation attack  Improved tracking speed Download link: https://www.aircrack- ng.org/downloads.html
  • 13.
    ADVANTAGES  To recoverlost information, password from the system.  To perform penetration testing for finding vulnerability to strengthen the computer system and network security.
  • 14.
    DISADVANTAGES  It causesprivacy violation.  Due to this there may be hamper system operation.  Denial of service attacks may be possible  Malicious attack on the computer system.  There may be security breach.  Get many vulnerability that causes stealing of sensitive information
  • 15.
    CONCLUSION There are severalof hacking tools are available in the internet for different purpose like some are for web applications, some are for networks and many more but the main use these tools is for error and bugs detection in the web page, web application.networks etc .
  • 16.
    REFERENCE All about thesehacking tools and many other are explain in this link: https://www.guru99.com/learn-everything-about- ethical-hacking-tools-and-skills.html