Legal software that hackers use for data theft


Aircrack soon

The modern was of the internet has long only had good pages: The growing digitization Also attracts more and more cybergangsterwho wishes to access their sensitive data with the help of security gaps or malware. It is not uncommon for you to use freely accessible software. Here we tell you which legal hacking tools are available and like them Criminals on the Internet so that even a step forward.

  • Destructive hackers abuse legal software for illegal purposes.
  • Mobile devices are also increasingly becoming the goal of the attackers from the Internet.
  • With the help of hacking tools, you can identify and correct the weak points in your network.

1. Five Hacker tool kits, which you legally get on the Internet

Hacking of the software rushes a bad reputation, which does not mean that it is inevitably always illegal. Legally get the following five internet utilities.

1.1. Aircrack uses security gaps in your WLANAircrack soon

With Aircrack you get immediately Several programs with the help you can explore the weak points in the networks and take advantage of it. The main tool of the instrument kit is the Decrypration Aircrack-NG software, which Discover Wlans security keys protected by Wep and WPA2 Candies. To this end, the so -called breed strength method is used for WEP, which means that all possible numbers and combinations of letters are simply tried.

Aircrack -ng only needs a few seconds to break a WEP key. For more complex WPA2 experts, on the other hand, it falls on dictionary attacks, in which the password is determined on the basis of a password list. However, this method only works WIf the password is made up of a sensitive string.

Extracting of the parameters available from Airodump -ng.
Extracting of the parameters available from Airodump -ng.

In addition to Aircrack -ng, the instrument package contains the following sub-programs:

  • Airbase -ng With the help of the SSID scans received, it is an access point.
  • Airdecap -ng Cracks Wip and WPA data from Wifis with the help of a well -known key.
  • Aireplay -ng Networks infiltrated with car packages -Create.
  • Airodump -ng Draw data traffic and indicate the information on the network.
  • Airolib-nng It manages and saves password and Essid lists for the calculation of WPA keys.
  • Airserv-nng Authorized network cards that are not locally connected through a TCP connection.
  • AIRTUN-NNG Build virtual tunnels.

1.2. The matrix fits with NMAPNMAP icon

The NMAP network tool is part of the category of so -called doors scanners: eg monitored All doors up to 1024 And also that when they are archived in the program of the program. In addition, of course, there is also the possibility of specifying the dedicated doors for control. However, NMAP only performs scans on target systems if they are be hosted by the user himself Or the operator gave his permission for this.

NMAP is a purely based tool on the text that Originally developed for Linux (GNU) he became. In the meantime there is also one with Zenmap Version of the program with graphic interface. If you have already acquired experience with the input line tools, it should Management on the console, however, no challenge represent them for them. For example, start a simple scan with the command

nmap OR nmap

Using the example Google (www.google.de, 172.217.19.99), the result therefore seems to be this:

The result of a simple scan with NMAP using the Google example
The result of a simple scan with NMAP using the Google example.

Good to know: The Nessus vulnerability scanner also carries out the search for open doors with Nmap.

Trinity (Carrie-Anne Moss) on the Hack of the power plant with NMAP
Trinity (Carrie-Anne Moss) at Power Plant Hack with Nmap.

Nmap va Hollywood: NMAP has also been used for «network analysis» in well -known films:

The «Matrix Reloaded» program has so far had its greatest appearance. Hacker Trinity uses one in the film weakness discovered by the softwarepenetrate the network of an electric power plant. On the contrary, a previous version of Zenmap appears in the success «The Bourne Ultimatum».

1.3. Wireshark cuts network traffic Wireshark logo

The «WireShark» Open Source tool is a network sniffer with which you can use the Cut traffic on any interface And therefore the results can be displayed through the GUI. The software supports 472 different protocolssuch as fiberchanes or IPV6.

With the help of Wireshark it is possible to test encryption or keep track of network problems. Hackers mainly use software Password filter and private data from traffic.

In addition to the graphic version, Wireshark also exists as Tool of control line based on TSHARK textThis has the same range of functions e Registrations in the format TCPDUMP saved. In this way, the results can be easily analyzed using the GUI, if necessary.

Wireshark in action
Wireshark in action.

On purpose: Until some time ago, Wireshark was mainly Under its old name «Ethereeal» known. After a change of employer by the developer, through which he lost the rights on the name, the software was renamed Wireshark.

1.4. Resources hacker manipulates the management of Windows users

ResourcehackerResource or reshacker hacker is a free utility of the developer Angus Johnson with which View and modify the components of the EXE files allow.

With the help of the software that manipoli, among other things

  • Shortcuts
  • Menu
  • Dialoghe
  • Check
  • Labeling

And it can also Change the start logo when the computer starts. Originally like Tool for viewing hidden applications files Thought, hacker of resources has now also become a popular tool for Cybergangster, which in this way Increase viruses and trojans on the unnoticed target systems.

Resource hacker contains a resource compiler for *RC files and a decompress for Exhibition and modification of executable files and resource bookcases. If necessary, it is also possible to create completely new resources files with the tool.

Overview of the Menu function of Resource Hacker.
Overview of the Menu function of Resource Hacker.

Tipp: Resource hacker is equipped with a graphic surface, but the program also offers many ways to process resources through the command line.

1.5. The recovery of the distributed password breaks almost every passwordDistributed password recovery logo

Elcomsoft’s «distributed password recovery» is in contrast with the hacking tools previously mentioned No freewareFor a price of 599 euros (5 customers), however, you get a particularly powerful tool kit with which authorities, forensic technicians and companies also work.

The software is able to break the passwords of over 300 different types of files. In addition to the Office documents and the PDF files, the Password of Personal security certificates, mailboxes and Windows or Linux Login be determined.

For this purpose, the Forta of the Cova method is used or the determination of the key sentences is determined using lists of defined words. The recovery of distributed password works through patented hardware acceleration technology and linear scalability on a maximum of 10,000 computers Up to 250 times faster than comparable decrystography programs. All GPUs of the Nvidia GeForce series are supported, the AMD models and the core of the integrated integrated graphic processor of the Intel CPU.

Insure Insure in recovering the distributed password
I assure in the recovery of the distributed password.

A warning: With «distributed password recovery», the main keys can also be broken by password managers such as Keepass, G Data or 1password.

2. Conclusion: legal hacking tools are a double -edged sword

Using hacker software, security experts and administrators can Check the information systems on safety gaps and close them in a targeted waySo to get attackers first.

The availability of these programs will also bring many dangersBecause the possibilities that open often try to be used improperly. You are in a criminal right using legal hacking tools in a gray area. However, sabotage computers or foreign data, According to the current law, there is a crime.

Even hacking tools are not authorized to weigh themselves: in some cases, they can make them punishable by distributing or providing the software.

Basically the following are applied: If you want to test one of the above programs, you should do it exclusively on your home computer and, if possible, do not start the query via the network or internet.

1 star2 stars3 stars4 stars5 stars (27 votes, media: 4.70 out of 5)
Loading …

latest posts published

Our complete stabilizer test

Our complete stabilizer test

Impeccable stabilization from start to finish with the Feiyu Tech G5 Characteristics Prix : See ...
Business Calendar Memory Screenshot app

The best memory supports for Android and iPhone

Have you forgotten an important day again and your partner is rightly pissed off? Or ...
1 star

Convert and edit audio files

The world of digital sound has experienced enormous development in recent years. The variety of ...
Notipad ++ logo

Code publishers: you should know these programming tools

A The code editor belongs to the toolbox of each developerbecause it can be programmed ...
VMLite, XP mode, article

XP mode in Windows 8 with VMLite

The XP mode introduced with Windows 7 is unfortunately not available in Windows 8 and ...
Old cell phones in Schubalde

How problematic are smartphones for the environment?

The Germans buy 23 million smartphones every year. Most of them are used from 2 ...
Make a period of time with a GoPro: how to do it?

Make a period of time with a GoPro: how to do it?

Tips to make the time with your GoPro You want advice for Take a tour ...
Screenshot Aus Ageo of Wonders: Planetfall

The best round -based strategy games for the PC

In fact, they just wanted to play a round and - Schwupps - the night ...
Free mobile game

Pay to Vince: the monetization of video games

Computer games like Possible cost traps they are very treated. In particular, mobile phones apps, ...
Smartphone in front of the laptop and calendar

With these 4 suggestions for the right mobile phone contract

Is a mobile phone with a contract in itself more expensive than other solutions? Many ...

Leave a Reply

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *