SlideShare a Scribd company logo
1 of 17
NAME: BHABANTA PADHAN
REGD.NO.: L1900502002
BRANCH: IT
SEMESTER: 6TH
JHARSUGUDA ENGINEERING
SCHOOL
CONTENT
1. WHAT IS HACKING AND HACKER?
2. WHAT ARE HACKING TOOLS?
3. TYPES OF HACKING TOOLS
4. SOME HACKING TOOLS NAME
5. ADVANTAGES
6. DISADVANTAGES
7. CONCLUSION
8. REFERENECE
WHAT IS HACKING AND HACKER?
 Hacking is the activity of identifying weaknesses in a
computer system or a network to exploit the security
to gain access to personal data or business data.
 The person who do hacking is known as Hacker.
 There are mainly three types of hacker:
i. White hat Hacker
ii. Black hat hacker
iii. Gray hat hacker
WHAT ARE HACKING TOOLS?
 Hacking Tools are computer programs and scripts
that help you find and exploit weaknesses in computer
systems, web applications, servers and networks.
 Using this the tester of the applications or the software
are find the error and bugs in that software or
application and find the way to fix them.
 This is also used in the cyber security .
TYPES OF HACKING TOOLS
 Website Hacking: Unauthorized access on web server and
database called website hacking.
 Network Hacking: Network Hacking means the collection
of information about a network by using different tools like
NS lookup, Telnet, Ping, Tracert, Netstat, etc. with the
intent to harm the network system and hamper its
operation.
 Email Hacking: Email hacking means getting
unauthorized access on an Email account with the intent to
steal sensitive information.
 Password Hacking: Password Hacking means recovering
passwords from a database without the consent of an
authorized password holders.
 Computer Hacking: Unauthorized access on computer
system to steal sensitive information.
SOME HACKING TOOLS NAME
Some hacking tools names are
1. Netsparker
2. Traceroute NG
3. Aircrack-NG
Lets discuss about these hacking tools
NETSPARKER
 Netsparker is an easy to use web application security
scanner that can automatically find SQL Injection,
XSS and other vulnerabilities in your web
applications and web services.
 It is available as on-premises and SAAS solution.
FEATURES OF NETSPARKER
 Dead accurate vulnerability detection with the unique
Proof-Based Scanning Technology.
 Minimal configuration required. Scanner automatically
detects URL rewrite rules, custom 404 error pages.
 REST API for seamless integration with the SDLC, bug
tracking systems etc.
 Fully scalable solution. Scan 1,000 web applications in
just 24 hours.
Download link:
https://www.netsparker.com/support/installing-
netsparker-standard/
TRACEROUTE NG
 Traceroute NG is application that enables you to
analyze network path. This software can identify IP
addresses, hostnames, and packet loss. It provides
accurate analysis through command line interface.
FEATURES OF TRACEROUTE NG
 It offers both TCP and ICMP network path
analysis.
 This application can create a txt logfile.
 Supports both IP4 and IPV6.
 Detect path changes and give you a notification.
 Allows continuous probing of a network.
Download link: https://www.solarwinds.com/free-
tools/traceroute-ng
AIRCRACK-NG
 Aircrack is one of the best, trustable, ethical
hacking tools in the market. It cracks vulnerable
wireless connections. It is powered by WEP WPA
and WPA2 encryption Keys.
FEATURES OF AIRCRACK-NG
 More cards/drivers supported
 Support all types of OS and platforms
 New WEP attack: PTW
 Support for WEP dictionary attack
 Support for Fragmentation attack
 Improved tracking speed
Download link: https://www.aircrack-
ng.org/downloads.html
ADVANTAGES
 To recover lost information, password from the
system.
 To perform penetration testing for finding
vulnerability to strengthen the computer system
and network security.
DISADVANTAGES
 It causes privacy violation.
 Due to this there may be hamper system
operation.
 Denial of service attacks may be possible
 Malicious attack on the computer system.
 There may be security breach.
 Get many vulnerability that causes stealing of
sensitive information
CONCLUSION
There are several of hacking tools are available in the
internet for different purpose like some are for web
applications, some are for networks and many more
but the main use these tools is for error and bugs
detection in the web page, web application.networks
etc .
REFERENCE
All about these hacking tools and many other are
explain in this link:
https://www.guru99.com/learn-everything-about-
ethical-hacking-tools-and-skills.html
Overview on hacking tools

More Related Content

What's hot

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architectureEY
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to Overview on hacking tools

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger GiralFaurel
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerIRJET Journal
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6HCL Technologies
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 

Similar to Overview on hacking tools (20)

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
43 automatic
43 automatic43 automatic
43 automatic
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 

Recently uploaded

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Overview on hacking tools

  • 1. NAME: BHABANTA PADHAN REGD.NO.: L1900502002 BRANCH: IT SEMESTER: 6TH JHARSUGUDA ENGINEERING SCHOOL
  • 2. CONTENT 1. WHAT IS HACKING AND HACKER? 2. WHAT ARE HACKING TOOLS? 3. TYPES OF HACKING TOOLS 4. SOME HACKING TOOLS NAME 5. ADVANTAGES 6. DISADVANTAGES 7. CONCLUSION 8. REFERENECE
  • 3. WHAT IS HACKING AND HACKER?  Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data.  The person who do hacking is known as Hacker.  There are mainly three types of hacker: i. White hat Hacker ii. Black hat hacker iii. Gray hat hacker
  • 4. WHAT ARE HACKING TOOLS?  Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks.  Using this the tester of the applications or the software are find the error and bugs in that software or application and find the way to fix them.  This is also used in the cyber security .
  • 5. TYPES OF HACKING TOOLS  Website Hacking: Unauthorized access on web server and database called website hacking.  Network Hacking: Network Hacking means the collection of information about a network by using different tools like NS lookup, Telnet, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.  Email Hacking: Email hacking means getting unauthorized access on an Email account with the intent to steal sensitive information.  Password Hacking: Password Hacking means recovering passwords from a database without the consent of an authorized password holders.  Computer Hacking: Unauthorized access on computer system to steal sensitive information.
  • 6. SOME HACKING TOOLS NAME Some hacking tools names are 1. Netsparker 2. Traceroute NG 3. Aircrack-NG Lets discuss about these hacking tools
  • 7. NETSPARKER  Netsparker is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services.  It is available as on-premises and SAAS solution.
  • 8. FEATURES OF NETSPARKER  Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology.  Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages.  REST API for seamless integration with the SDLC, bug tracking systems etc.  Fully scalable solution. Scan 1,000 web applications in just 24 hours. Download link: https://www.netsparker.com/support/installing- netsparker-standard/
  • 9. TRACEROUTE NG  Traceroute NG is application that enables you to analyze network path. This software can identify IP addresses, hostnames, and packet loss. It provides accurate analysis through command line interface.
  • 10. FEATURES OF TRACEROUTE NG  It offers both TCP and ICMP network path analysis.  This application can create a txt logfile.  Supports both IP4 and IPV6.  Detect path changes and give you a notification.  Allows continuous probing of a network. Download link: https://www.solarwinds.com/free- tools/traceroute-ng
  • 11. AIRCRACK-NG  Aircrack is one of the best, trustable, ethical hacking tools in the market. It cracks vulnerable wireless connections. It is powered by WEP WPA and WPA2 encryption Keys.
  • 12. FEATURES OF AIRCRACK-NG  More cards/drivers supported  Support all types of OS and platforms  New WEP attack: PTW  Support for WEP dictionary attack  Support for Fragmentation attack  Improved tracking speed Download link: https://www.aircrack- ng.org/downloads.html
  • 13. ADVANTAGES  To recover lost information, password from the system.  To perform penetration testing for finding vulnerability to strengthen the computer system and network security.
  • 14. DISADVANTAGES  It causes privacy violation.  Due to this there may be hamper system operation.  Denial of service attacks may be possible  Malicious attack on the computer system.  There may be security breach.  Get many vulnerability that causes stealing of sensitive information
  • 15. CONCLUSION There are several of hacking tools are available in the internet for different purpose like some are for web applications, some are for networks and many more but the main use these tools is for error and bugs detection in the web page, web application.networks etc .
  • 16. REFERENCE All about these hacking tools and many other are explain in this link: https://www.guru99.com/learn-everything-about- ethical-hacking-tools-and-skills.html