Top 11 Hacking and Security Apps for Linux

Linux is the hacker operating system par excellence. This is so not because it is "complicated" to use but because of the huge amount of hacking and security tools developed for this system. In this post, we list just some of the most important ones.


1. John the Ripper: password cracking tool. It is one of the best known and most popular (it also has a Windows version). In addition to autodetecting the password hash, you can configure it however you want. You can use it in encrypted passwords for Unix (DES, MD5 or Blowfish), Kerberos AFS and Windows. It has additional modules to include password hashes encrypted in MD4 and stored in LDAP, MySQL and others.

2. Nmap: Who does not know Nmap? Without a doubt the best program for network security. You can use it to find computers and services on a network. It is mostly used for port scanning, but this is only one of its possibilities. It is also capable of discovering passive services on a network as well as giving details of the discovered computers (operating system, time that it has been connected, software used to execute a service, presence of a firewall or even the brand of the remote network card). It works on Windows and Mac OS X too.

3. Nessus: tool to find and analyze software vulnerabilities, such as those that can be used to control or access data on the remote computer. It also locates default passwords, patches not installed, etc.

4. chkrootkit: basically it is a shell script to allow discovering rootkits installed in our system. The problem is that many current rootkits detect the presence of programs like this so as not to be detected.

5. Wireshark: Packet sniffer, used to analyze network traffic. It's similar to tcpdump (we'll talk about it later) but with a GUI and more sorting and filter options. Put the card in promiscuous mode to be able to analyze all network traffic. It is also for Windows.

6. untroubled: tool that allows opening TCP / UDP ports on a remote computer (afterwards it listens), associating a shell to that port and forcing UDP / TCP connections (useful for port tracing or bit-by-bit transfers between two computers).

7. Kismet: network detection, packet sniffer and intrusion system for 802.11 wireless networks.

8. hping: packet generator and analyzer for the TCP / IP protocol. In the latest versions, scripts based on the Tcl language can be used and it also implements a string engine (text strings) to describe TCP / IP packets, in this way it is easier to understand them as well as being able to manipulate them in a fairly easy way .

9. Snort: It is a NIPS: Network Prevention System and a NIDS: Network Intrusion Detetection, capable of analyzing IP networks. It is mainly used to detect attacks such as buffer overflows, access to open ports, web attacks, etc.

10. Tcpdump: debugging tool that runs from the command line. It allows you to see the TCP / IP packets (and others) that are being transmitted or received from the computer.

11. Metasploit: this tool that provides us with information on security vulnerabilities and allows penetration tests against remote systems. It also has a framework to make your own tools and is for both Linux and Windows. There are many tutorials on the net where they explain how to use it.

Source: Follow-info

The content of the article adheres to our principles of editorial ethics. To report an error click here!.

12 comments, leave yours

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Fernando Mumbach said

    "Nmap tutorial" without any links…. Pure Copy & Paste?

  2.   Martin said

    Very good post, chkrootkit and Metasploit did not know them. Eärendil, could you share us any security log you know (Spanish, preferably).

  3.   Saito Mordraug said

    Really excellent entry, favorites.

  4.   Let's use Linux said

    Look. The best security site (general ... not for "hackers") that I know is Segu-info.com.ar.
    Cheers! Paul.

    1.    gabriel said

      very good pag not the knowledge !! Excellent..

  5.   jamekasp said

    Excellent !!!!… thank you very much! .. that's why I have in my favorites .. «usemoslinux»… they always help me…. many thanks!… ..

    Greetings from BC Mexic…

  6.   Let's use Linux said

    Thank you! A hug!
    Cheers! Paul.

  7.   Sasuke said

    The Keylogger is also useful but that is for the Windows system although I do not believe much of that disque hacking only few people (Professionals) do those types of things:

    You can consult here a post that I found not long ago.
    http://theblogjose.blogspot.com/2014/06/conseguir-contrasenas-de-forma-segura-y.html

  8.   yassit said

    I wanna be hackin

  9.   ronald said

    We are looking for the best hackers from around the world, just serious and capable, write to. ronaldcluwts@yahoo.com

  10.   yo said

    Excellent post !. An opinion, for the curious who are just starting ... Try to get used to using the console, at first it can be a bit tedious, but ... with time they grab your hand, and taste too !. Why do I say this? Simple, Linux is not intended for the graphical environment (which is used now is something else), and the graphical environment sometimes makes it difficult to manipulate commands, while from a terminal you can play quietly. Greetings to the entire Linux community from Argentina, and to all the EH of the community 🙂

  11.   Anonymous said

    Why tcpdump if Wireshark?