Jump to content
BiosHell

Penetration Testing Tools

Recommended Posts

#1) Netsparker

Netsparker is a dead accurate automated scanner that will identify vulnerabilities such as SQL Injection and Cross-site Scripting in web applications and web APIs. Netsparker uniquely verifies the identified vulnerabilities proving they are real and not false positives.

Therefore you do not have to waste hours manually verifying the identified vulnerabilities once a scan is finished.

It is available as a Windows software and an online service.

 

#2) Acunetix

 

Acunetix is a fully automated web vulnerability scanner that detects and reports on over 4500 web application vulnerabilities including all variants of SQL Injection and XSS.

It complements the role of a penetration tester by automating tasks that can take hours to test for manually, delivering accurate results with no false positives at top speed.

Acunetix fully supports HTML5, JavaScript and Single-page applications as well as CMS systems. It includes advanced manual tools for penetration testers and integrates with popular Issue Trackers and WAFs.

 

#3) Core Impact

 

Core impact : With over 20 years in the market, Core Impact claim the largest range of exploits available in the market, they also let you run the free Metasploit exploits within their framework if they are missing one.  They automate a lot of processes with wizards, have a complete audit trail including PowerShell commands, and can re-test a client simply by re-playing the audit trail.

Core write their own ‘Commercial Grade’ exploits to guarantee quality and offer technical support around both those exploits and their platform.

They claim to be the market leader and used to have a price tag to match.  More recently the price has come down and they have models appropriate for both corporates and security consultancies.

 

#4) Metasploit

 

This is the most advanced and popular Framework that can be used to for pen-testing. It is based on the concept of ‘exploit’ which is a code that can surpass the security measures and enter a certain system. If entered, it runs a ‘payload’, a code that performs operations on a target machine, thus creating a perfect framework for penetration testing.

It can be used on web applications, networks, servers etc. It has a command-line and the GUI clickable interface works on Linux, Apple Mac OS X and Microsoft Windows. Although there might be few free limited trials available, this is a commercial product.

 

#5) Wireshark

This is basically a network protocol analyzer –popular for providing the minutest details about your network protocols, packet information, decryption etc. It can be used on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many other systems. The information that is retrieved via this tool can be viewed through a GUI or the TTY-mode TShark utility.  You can get your own free version of the tool from the link below.

 

#6) w3af

 

W3af is a Web Application Attack and Audit Framework.

Some of its features include fast HTTP requests, integration of web and proxy servers into the code, injecting payloads into various kinds of HTTP requests etc.

It has a command-line interface and works on Linux, Apple Mac OS X and Microsoft Windows.

All versions are free of charge to download.

 

#7) Nessus

Nessus is also a scanner and it needs to be watched out for. It is one of the most robust vulnerability identifier tools available. It specializes in compliance checks, Sensitive data searches, IPs scan, website scanning etc. and aids in finding the ‘weak-spots’.

It works best on most of the environments. For more information and in order to download, visit the below page.

 

#8) Burpsuite

Burp suite is also essentially a scanner (with a limited “intruder” tool for attacks), although many security testing specialists swear that pen-testing without this tool is unimaginable. The tool is not free, but very cost effective.

Take a look at it on the below download page. It mainly works wonders with intercepting proxy, crawling content and functionality, web application scanning etc.  You can use this on Windows, Mac OS X and Linux environments.

 

#9) Cain & Abel

If cracking encrypted passwords or network keys is what you need, then Cain & Abel is the perfect tool for you.

It uses network sniffing, Dictionary, Brute-Force & Cryptanalysis attacks, cache uncovering and routing protocol analysis methods to achieve this. Check out information about this free to use a tool at the below page. This is exclusively for Microsoft operating systems.

 

#10) Zed Attack Proxy (ZAP)

ZAP is completely free to use, scanner and security vulnerability finder for web applications. ZAP includes Proxy intercepting aspects, a variety of scanners, spiders etc.

It works best on most platforms. For more information and in order to download visit the below page

 

#11) John The Ripper

Another password cracker in line is John the Ripper. This tool works on most of the environments, although it’s primarily for UNIX systems. It is considered as one of the fastest tools in this genre.

Password hash code and strength-checking code are also made available to be integrated into your own software/code which I think is very unique. This tool comes in a pro and free form. Check out its site to obtain the software on this page.

 

#12) Retina

As opposed to a certain application or a server, Retina targets the entire environment at a particular company/firm. It comes as a package called Retina Community.

It is a commercial product and is a sort of a vulnerability management tool more than a pen-testing tool. It works on having scheduled assessments and presenting results. Check out more about this package at the below page.

 

#13) Sqlmap

Sqlmap is again a good open source pe-testing tool. This tool is mainly used for detecting and exploiting SQL injection issues in an application and hacking over of database servers.

It comes with the command-line interface. Platform: Linux, Apple Mac OS X and Microsoft Windows are its supported platforms. All versions of this tool are free for download. Check out the below page for details.

 

#14) Canvas

Immunity’s CANVAS is a widely used tool that contains more than 400 exploits and multiple payload options. It renders useful for web applications, wireless systems, networks etc.

It has a command-line and GUI interface, works best on Linux, Apple Mac OS X and Microsoft Windows. It is not free of charge and more information can be found at the below page.

 

#15) Social Engineer Toolkit

 

The Social-Engineer Toolkit (SET) is a unique tool in terms that the attacks are targeted at the human element than on the system element. It has features that let you send emails, java applets, etc containing the attack code. It goes without saying that this tool is to be used very carefully and only for ‘white-hat’ reasons.

It has a command-line interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is open source and can be found at below page.

 

#16) Sqlninja

 

Sqlninja, as the name, indicates it is all about taking over the DB server using SQL injection in any environment. This product by itself claims not to be so stable. Its popularity indicates how robust it is already with the DB related vulnerability exploitation.

It has a command-line interface, works best on Linux, Apple Mac OS X and not on Microsoft Windows. It is an open source and can be found at the below page.

 

#17) Nmap

“Network Mapper” though not necessarily a pen-testing tool, it is a must-have tool for ethical hackers. This is a very popular hacking tool that predominantly aids in understanding the characteristics of any target network.

The characteristics include host, services, OS, packet filters/firewalls etc.  It works on most of the environments and is open sourced.

 

#18) BeEF

 

BeEF stands for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser which means, it takes advantage of the fact that an open web-browser is the window(or crack) into a target system and designs its attacks to go on from this point.

It has a GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is an open source and can be found at the below page.

 

#19) Dradis

 

Dradis is an open source framework (a web application) that helps with maintaining the information that can be shared among the participants of a pen-test. The information collected helps to understand what is done and what needs to be done.

It achieves this purpose by the means of plugins to read and collect data from network scanning tools like Nmap, w3af, Nessus, Burp Suite, Nikto and much more.  It has a GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is an open source and can be found at the below page.

 

 

Additional Tools for Security and Pen-Testing

The above given is a huge list of penetration tools but that is not the end. There are few more tools and software that are gaining momentum in recent times.

Here are these:

21) Ettercap: A network and host analysis tool that provides sniffing and protocol dissection among other things. 

22) Veracode: Works with the code development process to ensure security and minimize the vulnerabilities at the source level. 

22) Aircrack-ng: Captures data packets and uses the same for recovery of 802.11 WEP and WPA-PSK keys.

23) Arachni: This is a Ruby framework that helps in analyzing web application security. It performs a meta-analysis on the HTTP responses it receives during an audit process and presents various insights into how secure the application is. 

24) IBM AppScan:  As the name itself indicates, this is a scanner that identifies problem areas and suggests remedial actions. 

25) Nagios:  This Software when used will monitor the entire environment including servers, applications, network – the entire infrastructure and alert when a potential problem is detected. 

26) WebScarabNG: This tool uses the HTTP/https requests between the browser and the server to understand, capture and sometimes modify the parameters that are part of the communication between the two parties. 

27) Maltego: This is a unique tool that focuses on showing/highlighting the relationships between people, sites, infrastructure etc. in order to identify inconsistent/incorrect connections. 

28) IronWASP: It is a customizable scanner creator for web applications using python/ruby scripting. 

29) HconSTF: Using this tool you can create your own web exploits, decoys that you can use to exploit vulnerabilities in the areas of passwords, databases, network etc. 

30) OpenVAS: Stands for Open Vulnerabilities Assessment System. Well, the name says it all. For more info, 

31) Secunia PSI: It is a personal software inspector that will keep your system secure when installed. 

 

 

Source https://www.softwaretestinghelp.com/penetration-testing-tools/

 

 

 

  • Upvote 4

Share this post


Link to post
Share on other sites

sau se pot instala pe orice distributie ca sunt grupate pe categorii, depinde ce te intere, vezi metapackages de pe site-ul oficial kali.

  • Upvote 1

Share this post


Link to post
Share on other sites
1 hour ago, OKQL said:

Cand vad atatea tooluri puse la gramada ma simt ca si cum as merge la supermarket. Imi uplu caruciorul de produse si apoi ma indop cu ele fara sa stiu ce consum. Si trec anii si apoi imi dau seama ca nu mai stiu sa fac un ou cu cartofi prajiti.

Acum serios, pana nu pui mana sa intelegi protocolul, toolurile astea sunt doar ca sa te tina pe loc. Cam rar am gasit ceva bun, lucrurile bune sunt deja consacrate.

Am sute de giga de materiale, le tin acolo pentru cine stie cand. Probabil nu le voi citi niciodata.

Bafta! 😎

  • Like 1
  • Upvote 2

Share this post


Link to post
Share on other sites
5 hours ago, gigiRoman said:

Cand vad atatea tooluri puse la gramada ma simt ca si cum as merge la supermarket. Imi uplu caruciorul de produse si apoi ma indop cu ele fara sa stiu ce consum. Si trec anii si apoi imi dau seama ca nu mai stiu sa fac un ou cu cartofi prajiti.

Acum serios, pana nu pui mana sa intelegi protocolul, toolurile astea sunt doar ca sa te tina pe loc. Cam rar am gasit ceva bun, lucrurile bune sunt deja consacrate.

Am sute de giga de materiale, le tin acolo pentru cine stie cand. Probabil nu le voi citi niciodata.

Bafta! 😎

In caz de vrei sa-ti faci Os anonimus :)))

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...