Monday, 18 July 2011

Most Popular Hacking Tools

1. Tool for Tracking Area Through Mobile Number and Area Code
Who want to track the number of spam that is often stuck at HP?Here it is the solution hehe. 
Sometimes there are suddenly not important incoming sms and not really know who it is sent. To check the location please download below: 2. Nessus "Nessus" was first made ​​by Renaud Deraison in 1998 and distributed to community internet freely, useful, was updated with a good and easy to use.

Nessus is a program for finding weaknesses in a computer system.According to the official website at, the tool has been used by more than 75,000 organizations and companies around the world.
3. Snort
Snort is an IDS, which is a tool to prevent and detect attacks on computer systems. Vendors of snort claims that the tool has been in the downloadedmillions of times from their site. You may be interested to try it, pleasedownload this tool at .
4. Kismet
Kismet is a tool to detect the connection wireless (traffic support 802.11b, 802.11a, and 802.11g), capture packets in a network system and become anIDS ( intrusion detection system ) .
To find out more about kismet, you can visit the site or go to # kismet.
5. Metasploit Framework
Metasploit Framework is a project open source to develop, test and using exploit code. Created with the Perl language as the basis and foundation and consists of complementary components that have been compiled with the C language, assembler, and Python. Metasploit Framework can run on UNIX operating systems, Linux and Windows. More detailed information you can find in .
6. Netcat
Netcat is a networking tool utility that can read and write data on a network connection via TCP / IP.
Features on Netcat include:
  • Outgoing and incoming connections through TCP or UDP protocol with the port being used ..
  • Tunneling mode, tunneling from UDP to TCP, to map the network parameters (source port / interface, listening port / interface, and allows remote hosts to connect to the tunnel)
  • Port scanners, to detect an open port.
  • Buffered send-mode and hexdump RFC854 telnet .
7. Hping 

Hping is a tool versatile. Tool can be used to test the ability of the firewall l, looking for open ports, network security testing using various types of protocols, obtain operating system information, evaluates the TCP / IP.
Tcpdump is also a sniffer . Network admins use tool to monitor traffic and analyze problems in the event of disruption. According to information in, Tcpdump uses packet filters from BSD UNIX to to capture data (BPF / BSD Packet Filter). BPF received a copy of the driver tcpdump paket.Pengguna sender and receiver can also filter packets according to desire.
9. John The Ripper
password cracker era ancestor of the hackers are still a top 10 favorite tools. Here is a description of the author John The Ripper.
John the Ripper is a password cracker, currently available for UNIX , DOS, WinNT/Win95. Its primary purpose is to detect weak UNIX passwords. It has been tested with x86/Alpha/SPARC Linux, FreeBSD x86, OpenBSD x86, Solaris 2.x SPARC and x86, Digital UNIX, AIX, HP-UX, and IRIX . "

10. Cain and Abel 

Cain & Abel is a tool for the problem of passwords . Tool can collectpasswords with the method of network sniffing , to crack passwords usingDictionary attacks, Brute-Force and cryptanalysis attacks , recording the conversations of VoIP (Voice Over Internet Protocol ) , to crack networkwireless , analyze traffic in the network. 11. 

Wireshark / Ethereal
Wireshark / Ethereal is a tool to analyze network protocols. Function also as a sniffer. Monitor Internet traffic. Wireshark
can run on Windows, MAC OS X, and Linux.
Interested? Learn and understand just how to use tools TSB 10. We did not encounter problems as easy as it would be a great hacker tool by simply relying on the above 10. But tool2 TSB has been recognized by all levels Hacker. It can be added for anda2 who want to wrestle the computer security in depth.
12. Cheat Engine
Who does not know Cheat Engine? This tool is very much in use by hackers to hack game game, such as Facebook games and other PC games.
13. Fiddler
Fiddler also includes tools for hacking games. How to use fiddler very easy, but to make the swf file, it should require hacking and programing skills are sufficient.
14. Backtrack
If asked, hacking tools what is the most complete? then the answer is immediate and unequivocal " Backtrack ". Backtrack is a linux distro made ​​specifically to find and penetrate the security of a system. Backtrack can be installed on the computer or just run through Live CD. Backtrack final was first launched on May 26, 2006 by Mati Aharoni and Max Moser. The latest version of BackTrack has reached version 4. There are many changes in this latest version, if previously Backtrack is made ​​based on Slackware, the latest version 4 is based on Debian.

Backtrack has more than 300 popular security and hacking tools.This is a very large number for a collection of security tools.Backtrack also became the most popular tools to determine network security.
Here are some tools and security features that are popular in Backtrack:

1. Metasploit
2. Rfmon Injection
3. Kismet
4. Auto-scan Network
5. nmap
6. Ettercap
7. Wireshark / Ethereal
, etc., see the full official website Backtrack Download Backtrack: -Through Official Sites - Through the Softpedia - Mirror Server Indonesia

That's hacking tools most widely used and most popular. Hopefully this info is useful and can add to our insights about the hacking ...Source: Results Copas from the website of the website through google 


Post a Comment

Type your comment....

Hacks 'n' App
Twitter Delicious Facebook Digg Stumbleupon Favorites More

Design by Ahmad Nabeel | Bloggerized by DL-Portal - This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us . we will immediately respond to you. | Enjoy!
Creative Commons License
HypeTech by Ahmad Nabeel is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
Based on a work at