Ethical Hacking: Free and open applications for your GNU / Linux Distro

Ethical Hacking: Free and open applications for your GNU / Linux Distro

Ethical Hacking: Free and open applications for your GNU / Linux Distro

Today, we will continue with one more of our posts related to the topic «Hacking & Pentesting » about the World of Free Software, Open Source and GNU / Linux. To do this, we will focus on the concept of "Ethical Hacking" and Free and open applications of that area that we can use on our GNU / Linux Distro.

And why on GNU / Linux? Because it is well known that professionals in the field of «Hacking & Pentesting » prefer GNU / Linux over Windows, MacOS or another, for their professional work, since, among many things, offers a greater amount of control on each element of it. Also, why is it very well built and integrated around its Command line interface (CLI), that is, your terminal or console. Furthermore, it is more safe and transparent because it is free and open, and because Windows / MacOS is often a more attractive target.

Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field

Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field

Before entering fully into the theme of "Ethical Hacking"As usual, we recommend that after reading this publication, visit our previous publications related to the subject of «Hacker », such as:

Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field
Related article:
Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field
Hacking: It is not only doing things better but thinking better about things
Related article:
Hacking: It is not only doing things better but thinking better about things
Free Software and Movement Hackers
Related article:
Related Movements: If we use Free Software, are we also Hackers?
Hack Education
Related article:
Hacking Education: The Free Software Movement and the Educational Process

Ethical Hacking: Content

Ethical Hacking: Hackers are the good guys, Crackers aren't!

Hackers and Pentesters

Before moving towards the "Ethical Hacking" we will clarify once again, the term «Chippers y Pentester », so that there are no normal confusions that usually occur in this field of Computer Science.

Chippers

Briefly, a Hacker in general terms can be defined as:

"A person who masters a knowledge, art, technique or technology very well or perfectly well, or many of them at the same time, and continually seeks and manages to overcome or overcome it through study and continuous practice, in favor of himself and the others, that is, the majorities." Related Movements: If we use Free Software, are we also Hackers?

Computer hacker

While, a Hacker in computer terms can be defined as:

"A person who sue inevitably use and dominate ICTs, to gain efficient and effective access to the sources of knowledge and the existing control mechanisms (social, political, economic, cultural and technological) to make the necessary changes for the benefit of all. Therefore, he is always in constant search of knowledge, in everything related to computer systems, their security mechanisms, their vulnerabilities, how to take advantage of these vulnerabilities and the associated mechanisms, to protect himself and others from those who know how to do it. " Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field

pen tester

Therefore, this leaves us consequently that a «Pentester » is

A Professional in the area of ​​Computer Science, whose job consists of following various processes or certain steps that guarantee a good examination or computer analysis, in such a way, to be able to make all possible inquiries about failures or vulnerabilities in an analyzed computer system. Therefore, it is often called a Cybersecurity Auditor. Their work, that is, pentesting is really a form of hacking, only that this practice is totally legal, since it has the consent of the owners of the equipment to be tested, in addition to having the intention of causing a real damage to remedy. Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field

What is Ethical Hacking?

Basically the "Ethical Hacking" It is the field of action that defines the work of those professionals who dedicate themselves and / or are hired to hack a computer system, in order to identify and repair possible vulnerabilities found, which effectively prevents exploitation by "Malicious hackers" o "Crakers".

Hence, in the "Ethical Hacking" Those involved specialize in penetration testing of computer systems and software in order to evaluate, strengthen and improve security. Which is why, they are usually known as Hackers de "White Hat", unlike their opponents, that is, Criminal Hackers, who usually carry the name of "Black Hat". Or in other words, a "Ethical Hacker" it is often a Pentester or with a "Unethical Hacker" can be considered as a "Craker".

Finally, and to complement the reading, it is worth noting that there are also so-called "Gray Hat" Hackers who are usually between the 2 sides, since sometimes they carry out operations that are usually in conflict from a moral point of view, such as: Hack (hack) groups they ideologically oppose or run "Hacktivist Cyberprotests" that can cause certain direct or collateral damages to some.

Free, open and free Hacking & Pentesting applications

Platform, System, Application and File Scanning Software

  • OpenVAS
  • Metasploit
  • Pig
  • scapey
  • Pompem
  • Nmap

Network Monitoring Applications and Data Collection from Public Sources

  • justniffer
  • HTTPRY
  • ngrep
  • PassiveDNS
  • History
  • Node Security Platform
  • ntopng
  • fibratus

Protection and Anti-Intruder Systems

  • Snort
  • Bro
  • OSSEC
  • Suricata
  • SSH WATCH
  • Stealth
  • AI Engine
  • denyhosts
  • Fail2Ban
  • SSH Guard
  • Lynis

Intelligence Tool, Honeyspot and more

  • Honeypy
  • Conpot
  • amun
  • Glastopf
  • kippo
  • kojoney
  • HonSSH
  • Bifrozt
  • Honeydrive
  • Cuckoo Sandbox

Network packet capture utilities

  • tcpflow
  • xplico
  • Moloch
  • OpenFPC
  • shell
  • stenographer

Trackers for Local and Global Networks

  • Wireshark
  • netsniff-ng

Systems for gathering information and managing events

  • Prelude
  • OSSIM
  • FIR

Encryption of web traffic via VPN

  • openvpn

Package processing

  • DPDK
  • FAQ
  • PF_RING
  • PF_RING ZC (Zero Copy)
  • PACKET_MMAP / TPACKET / AF_PACKET
  • netmap

Integrated protection systems for workstations and servers - Firewall

  • pfsense
  • OPNsense
  • FWKNOP

To learn a little more about these and others, you can explore the following websites, in English, which have excellent, well-updated lists: link 1, link 2 y link 3.

Others already commented on the Blog

hacking tools
Related article:
Fsociety: An excellent pack of hacking tools
OWASP and OSINT: More on Cybersecurity, Privacy and Anonymity
Related article:
OWASP and OSINT: More on Cybersecurity, Privacy and Anonymity
Related article:
Top 11 Hacking and Security Apps for Linux

Already finished the list and the publication, if anyone knows any another interesting app and worthy of being included in the list made, you can leave us the name in comments so that later we add it. And in other future posts we will explain some of them in more detail. Meanwhile, and finally, remember that:

"Hackers not only do better or incredible things, that is, they not only solve problems and / or build innovative or radical things that others see difficult or impossible, but by doing them they think differently than average, that is, they think in terms of "Freedom, independence, security, privacy, collaboration, massification". If you want to be a Hacker, you must behave as dictated by this philosophy of life, carry that attitude within yourself, make it an integral part of your being." Hacking: It is not only doing things better but thinking better about things

Generic image for article conclusions

Conclusion

We hope this "useful little post" about him «Hacking Ético» and the possible and / or best known Free and open applications of this area that we can use on our GNU / Linux Distro, to become excellent professionals in the world of «Hacking & Pentesting »; is of great interest and utility, for the entire «Comunidad de Software Libre y Código Abierto» and of great contribution to the diffusion of the wonderful, gigantic and growing ecosystem of applications of «GNU/Linux».

For now, if you liked this publicación, Do not stop share it with others, on your favorite websites, channels, groups or communities of social networks or messaging systems, preferably free, open and / or more secure as Telegram, Signal, Mastodon or another of Fediverse, preferably. And remember to visit our home page at «DesdeLinux» to explore more news, as well as join our official channel of Telegram from DesdeLinux. While, for more information, you can visit any Online library as OpenLibra y jedit, to access and read digital books (PDFs) on this topic or others.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.