Skip to main content

Kali Linux Tools And Information

  About Kali Linux Tools And Information



Today's topic is about an kali linux and its Information Tools. previous video we have thought that what is collagen and and its information today we are going to talk about understood every information. so when you are trying to hack others are you want to prevent us from the hackers we should use the tools in Kali Linux in some cases. we are using some of the tool in inbuilt tool in Kali Linux so this was used and this was placed by the sea languages even when we are trying to hack the other like website these tools were used…


I am listing some of the tool 

1. Nmap
2. Metasploit
3. Hydra
4. Brup suit
5.wireshark
6.Meltego



1.Nm:Nmap,
 short for Network Mapper, is a network discovery and security auditing tool. 
It is known for its simple and easy to remember flags that provide powerful scanning options. 
Nmap is widely used by network administrators to scan for:






  • Open ports and services
  • Discover services along with their versions
  • Guess the operating system running on a target machine
  • Get accurate packet routes till the target machine
  • Monitoring hosts

                  Metasploit is the world's leading exploitation/hacker framework.
 It is used, to some extent, by nearly every hacker/pentester.
 As such, you really need to become familiar with it if you want to enter and prosper in this burgeoning field.


                   
Metasploit is standardized framework for use in offensive security or penetration testing (legal hacking to find vulnerabilities before the bad guys do). 
Before Metasploit, exploits and shellcode would be developed by various developers, in various languages, for various systems. 
The pentester had to rely upon the trustworthiness of the developer that it was laden with malicious code and learn how the developer intended the exploit/shellcode/tool to work. 
With Metasploit, the pentester has a standardized framework to work from where tools work similarly and all are written in the same language making things much simpler and easier.

Originally developed by HD Moore as an open-source project, it is now owned by the security company, Rapid7 (Rapid7 also owns the vulnerability scanner, Nexpose). 
Although originally developed as an open-source project, Rapid7 has now developed a Pro version of Metasploit with a few more "bells and whistles". 
Fortunately, the open-source, community-edition is still available to the rest of us without the tens of thousands of dollars to spend on the Pro version 
(if you are a professional pentester, the efficiency and time savings accrued in using the Pro version make it a good investment).




3.Hydra:
          
Hydra is a login cracker that supports many protocols to attack
 ( Cisco AAA, Cisco auth, Cisco enable, 
CVS, FTP, HTTP(S)-FORM-GET, 
HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD,
 HTTP-Proxy, ICQ, IMAP, IRC, LDAP,
 MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID,
 PC-Anywhere, PC-NFS, POP3, PostgreSQL,
 RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, 
SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet,
 VMware-Auth, VNC and XMPP).



You Can Use This Command 

hydra -l /usr/share/wordlists/metasploit/user -P 
/usr/share/wordlists/metasploit/ passwords ftp://192.168.1.101 –V







4.Brup Suit:

                     
                         You can strengthen your web security by testing for common vulnerabilities. We show how to do this using the attack proxy known as Burp Suite.
Many automated web security tools are available in the market today, but even the best of these tools have limitations. 
Many web vulnerabilities are difficult – or even impossible – to detect without human interaction. Some of the best tools for web security analysis take the form of a browser (with a few simple add-ons) and an attack proxy. 
This article describes how attack proxies work and shows how to look for web vulnerabilities using the popular attack proxy Burp Suite.
Attack proxies vary in functionality, price, and reliability, so for consistency, I'll use Burp Suite throughout these examples.
 Burp Suite includes a tool for intercepting traffic (the "proxy" module itself), as well as modules for spidering sites, repeating and manipulating individual requests, sequencing random values, decoding traffic, and more. 
Each of these components provides unique insight into the application's functionality and security ramifications, but all require an intelligent person to decode the results.


                   Wireshark is a very powerful and popular network analyzer for Windows, Mac and Linux. 
It’s a tool that is used to inspect data passing through a network interface which could be your ethernet, LAN and WiFi.
Check out our recommended Wireshark training books and study guides. 
The prices vary from only $5 for the Kindle Version to full comprehensive Wireshark tutorial guides. 
Some of these titles are ideal for beginners that are interested to learn more about networking and being able to sniff traffic.


It is important to note that whilst this is an excellent tool for a network administrator that needs to check that their customers sensitive data is being transmitted securely – it can also be used be used by hackers on unsecured networks – such as airport WiFi. 
Moral of the story at this point is to stay clear of clear text http protocols: that is the best advice we can give. To remedy this we would encourage you to use a Firefox addon called https everywhere or use an SSH or VPN tunnel.

6. Meltego :
                  Maltego is capable of gathering information about either a network or an individual with one simple scan.



Maltego is a program built into Kali Linux that lets you do reconnaissance on any person, by scraping up data from all publicly available areas of the Internets.
 Maltego is used for information gathering and data-mining, and can be useful for anyone who needs to gather data on a person or company.
For my series on Maltego, I’m going to be using my Kali Linux VM. To open Maltego, just type maltego into the command line.
Go through the registration process for the free community version of Maltego and sign up! There is also a paid version that can be used for more detailed outputs and for penetration testing in a business setting.
Open a blank graph and you’re golden! You’ll notice this thing called a palette on the left side. This will show you all sorts of entities we can gather data on. 
You can drag and drop whatever entity you want to mine data on.
 Whatever item you end up dragging and dropping onto your graph will end up being a node.
For my example, we’ll gather data on hak5.wpengine.com. 
You can also change this by double clicking inside the domain box on your new graph.
But my graph still looks kind of boring so lets gather some specific data. 
To do so, you’ll right click on your domain box, then choose to “run transforms”. 
This means it’ll run a search based on your option. 
So now that you’ve gotten a chance to check out the options under run transforms, choose one that you are interested in learning about. 
First off, I can run a transform on the email domain associated with Tamil Hacking and I find that there’s a few out there available publicly. 
Next, I can look for the website address, which should be TamilehHacking I can right click on the server looking icon and choose the transform labeled ToServerTechnologiesWebsite.
 Now when it’s done, we can see running on Apache, with wordpress, PHP and Google Analytics both added.





Comments

Popular posts from this blog

What Is Brute Force

  What is a Brute-force attack? A  brute force  attack is an attempt to crack a password or username or find a hidden web page, or find the key used to encrypt a message, using a trial and error approach and hoping, eventually, to guess correctly. This is an old attack method, but it's still effective and popular with hackers. Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends on the set of predefined values. If it is larger, it will take more time, but there is better probability of success. The most common and easiest to understand example of the brute-force attack is the dictionary attack to crack the password. In this, attacker uses a password dictionary that contains millions of words that can be used as a password. Then the attacker tries these passwords one by one for authentication. If this dictionary contains the correct password, attacker will succeed. ...

penetration Testing

                                      W What Is Penetration Testin g Penetration Testing                                 Penetration testing can help you improve both the security and quality of your product. It’s a complex yet creative process where you must understand what you’re doing and why you’re doing it. It's like in the movie. where hacker-consultants break into your corporate networks to find weaknesses before attackers do. It’s a simulated cyber attack where the pentester or ethical hacker uses the tools and techniques available to malicious hackers. Back in ye olde days of yore, hacking was hard and required a lot of manual bit fiddling. Today, though, a full suite of automated testing tools turn hackers into cyborgs, computer-enhanced humans who can test far more than ever before. ...

Types Of Ethical Hackers

Types Of Hackers And Its Information Hi Today Video Is About What Is Ethical Hacking Most If Us Where Thing That’s Hacking Is A  Crime And Hacking Is Illegal… But In The Modern Technology Hacking IS Leads To EveryThing But why Hacking has many types  And there are many types of Hackers in the world but here about it we should know what are the types of hackers in the world And we are going to learn here  First Of All Who Is A Hacker A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. ... Script kiddies: A non-skilled person who gains access to computer systems using already made tools A Hacker is a person who is intensely interested in the mysterious workings of any computer operating system. Hackers are most often programmers. They gather advanced knowledge of operating systems and programmin...