2. CONTENT
1. WHAT IS HACKING AND HACKER?
2. WHAT ARE HACKING TOOLS?
3. TYPES OF HACKING TOOLS
4. SOME HACKING TOOLS NAME
5. ADVANTAGES
6. DISADVANTAGES
7. CONCLUSION
8. REFERENECE
3. WHAT IS HACKING AND HACKER?
Hacking is the activity of identifying weaknesses in a
computer system or a network to exploit the security
to gain access to personal data or business data.
The person who do hacking is known as Hacker.
There are mainly three types of hacker:
i. White hat Hacker
ii. Black hat hacker
iii. Gray hat hacker
4. WHAT ARE HACKING TOOLS?
Hacking Tools are computer programs and scripts
that help you find and exploit weaknesses in computer
systems, web applications, servers and networks.
Using this the tester of the applications or the software
are find the error and bugs in that software or
application and find the way to fix them.
This is also used in the cyber security .
5. TYPES OF HACKING TOOLS
Website Hacking: Unauthorized access on web server and
database called website hacking.
Network Hacking: Network Hacking means the collection
of information about a network by using different tools like
NS lookup, Telnet, Ping, Tracert, Netstat, etc. with the
intent to harm the network system and hamper its
operation.
Email Hacking: Email hacking means getting
unauthorized access on an Email account with the intent to
steal sensitive information.
Password Hacking: Password Hacking means recovering
passwords from a database without the consent of an
authorized password holders.
Computer Hacking: Unauthorized access on computer
system to steal sensitive information.
6. SOME HACKING TOOLS NAME
Some hacking tools names are
1. Netsparker
2. Traceroute NG
3. Aircrack-NG
Lets discuss about these hacking tools
7. NETSPARKER
Netsparker is an easy to use web application security
scanner that can automatically find SQL Injection,
XSS and other vulnerabilities in your web
applications and web services.
It is available as on-premises and SAAS solution.
8. FEATURES OF NETSPARKER
Dead accurate vulnerability detection with the unique
Proof-Based Scanning Technology.
Minimal configuration required. Scanner automatically
detects URL rewrite rules, custom 404 error pages.
REST API for seamless integration with the SDLC, bug
tracking systems etc.
Fully scalable solution. Scan 1,000 web applications in
just 24 hours.
Download link:
https://www.netsparker.com/support/installing-
netsparker-standard/
9. TRACEROUTE NG
Traceroute NG is application that enables you to
analyze network path. This software can identify IP
addresses, hostnames, and packet loss. It provides
accurate analysis through command line interface.
10. FEATURES OF TRACEROUTE NG
It offers both TCP and ICMP network path
analysis.
This application can create a txt logfile.
Supports both IP4 and IPV6.
Detect path changes and give you a notification.
Allows continuous probing of a network.
Download link: https://www.solarwinds.com/free-
tools/traceroute-ng
11. AIRCRACK-NG
Aircrack is one of the best, trustable, ethical
hacking tools in the market. It cracks vulnerable
wireless connections. It is powered by WEP WPA
and WPA2 encryption Keys.
12. FEATURES OF AIRCRACK-NG
More cards/drivers supported
Support all types of OS and platforms
New WEP attack: PTW
Support for WEP dictionary attack
Support for Fragmentation attack
Improved tracking speed
Download link: https://www.aircrack-
ng.org/downloads.html
13. ADVANTAGES
To recover lost information, password from the
system.
To perform penetration testing for finding
vulnerability to strengthen the computer system
and network security.
14. DISADVANTAGES
It causes privacy violation.
Due to this there may be hamper system
operation.
Denial of service attacks may be possible
Malicious attack on the computer system.
There may be security breach.
Get many vulnerability that causes stealing of
sensitive information
15. CONCLUSION
There are several of hacking tools are available in the
internet for different purpose like some are for web
applications, some are for networks and many more
but the main use these tools is for error and bugs
detection in the web page, web application.networks
etc .
16. REFERENCE
All about these hacking tools and many other are
explain in this link:
https://www.guru99.com/learn-everything-about-
ethical-hacking-tools-and-skills.html