Top 10 Security Tools In Kali Linux 1.0.6

Top 10 Security Tools In Kali Linux 1.0.6 

Security Tools In Kali LinuxKali Linux an advanced version of backtrack and a well known penetration testing OS which contain many tools for different security purpose. Kali Linux has always been a first choice for every security professional because of their huge amount of tools. After the release of  Kali Linux version 1.0.6 some new tools are added that i’m going to discuss the Top 10 security tools in Kali Linux. 

#1. Fern Wifi Cracker

One of the top 10 security tools in kali linux 1.0.6 written in python programming language and python GUI library. Just like the previous “revear”  tool  it is also used for cracking WEP/WPA and WPS and other networks on wireless or Ethernet based attacks.

#2.Hydra

Hydra is an easy to use, flexible and fast tool to crack login details by supporting various protocols to attack.

#3.Maltego

Maltego can be used in the information gathering phase of security related work to save your time and work more accurately. It can also give you much powerful search with accurate results.

#4.Zenmap 

It is an official nmap security scanner having two platform free and open source which make it easy to for beginner nmap user while advanced features for their expertised users.

#5.Sqlmap 

A penetration testing tool used for detecting and exploiting SQL injection loopholes of a database servers.

#6.Wireshark

Wireshark is an analyzing software use for packets analyzing, troubleshooting and communication protocol development.

#7.Zed Attack Proxy 

Zed Attack Proxy can used to find automatic vulnerabilities in web applications as well as it provide methods to find vulnerabilities manually.

#8 Metasploit Framework

This tool can allow you to execute exploits script on remote machine.

#9.John the Ripper

John the ripper is a password cracking tool combines many password crackers into one package.

#10 Burp Suite

A penetration testing tool to perform security testing of web applications and finding exploiting security vulnerabilities.
Previous
Next Post »

2 comments

Click here for comments
Anonymous
admin
16 April 2015 at 10:53 ×

thanx bro

Reply
avatar
Anonymous
admin
16 April 2015 at 10:54 ×

thanx frnd

Reply
avatar