-40%
Hackers Tools media turns a PC into a hackers workshop with thousands of tools
$ 13.17
- Description
- Size Guide
Description
This is the most advanced Ethical Hacking Suite layout currently available.This suite offers resources and tools that are not available from anyone else.
There are two media options available which include either USB Flash drive or SSD.
If you want something that is completely portable or want to install on an existing Hard disk or SSD, then a flash drive might be the best choice.
If you have a system you want to dedicate to using the suite or a system that has a an extra SATA connection available, then you may want to get the SATA drive.
The SATA drive will also have other obvious benefits like being much faster at read/write than any flash drive.
Even though most of suite is Linux based, the majority of the resources can be used from within Microsoft Windows if you choose to use them that way.
When used in a virtual environment, you control the resources that are allocated to the system and can create a virtual drive to install any of them.
If you want something specific that might not offer just contact me and I will see what I can do to create what you want.
Some information specific to what is offered in this listing:
The distributions only Include systems that are still actively updated.
The distributions support recent versions of software that work with current exploitable vulnerabilities
There is not much value in using something that was discontinued almost a decade ago as it was never meant to be used used in today’s computing environment.
The majority of the systems offered can be used in a live environment by loading at boot up or virtually from within Microsoft Windows.
There are also links to resources that will help to learn how to use the large variety of tools available.
A cheat sheet is included which covers many of the programs categorized by their purpose and links to get more information on them.
There distributions that are updated continuously like Kali and there have not been discontinued after years of upkeep. Most distributions are also going to contain the same tools, but different versions of them. There are also distributions that focus on just application security or other specific areas. The only other difference is the interface and the distribution they were build in such as Debian, Arch or Fedora. While old exploits might work on old systems, the reality is that many have already be patched or updated and are no longer vulnerable to old exploits. While not every distribution has been updated within 2021 or 2022, the ones I offer have been updated within the last few years and include:
Kali
BackBox
BlackWeb
Parrot Security
BlackArch
SamuraiWTF – Virtual Boot Only
Fedora-Security
Pentoo
ArchStrike
Demon Linux
Caine
NST
Notes:
If your looking for a specific combination of distributions, please contact me as anything can be done and is only limited by the media capacity.
Honeypot related software is available, but requires much more disk space to actively collect data and would require much larger media. Contact me if you're interested.
Unless you want them, we won’t include any of the following systems as it is not wise to offer unsupported distributions with old versions of utilities:
BugTraq
– Discontinued after parent company bought out, not currently available
CyborgHawk
– Discontinued, No new release in over 6 years
Deft Linux
– Last release in 2017, not currently available
GnackTrack
- Not updated since 2011
Node Zero
- Not updated since 2010
Operator
– Not updated since 2005
URIX
- Not updated since 2016
Others
…
As stated, there isn’t much point of learning old tools that are not effective in today's environment so it wouldn’t be recommended to use any of the distributions listed. The same is true of discontinued and unsupported distributions as if anything is broken or buggy, it will go unsupported and unfixed
The main categories of pen testing tools include:
Information Gathering
Vulnerability Analysis
Wireless Attacks
Web Applications
Exploitation Tools
Stress Testing
Forensics Tools
Sniffing & Spoofing
Password Attacks
Maintaining Access
Reverse Engineer
Reporting Tools
Hardware Hacking
Some of the basic tools in most Pen Testing systems include:
Aircrack-ng
-
A packet sniffer for wireless LANs.
Autopsy
- A graphical interface to The Sleuth Kit, which aids forensic exploration of hard disks.
Armitage
- A front end for Metasploit tools that manages attack strategies.
Burp Suite
- A system that launches man-in-the-middle attacks and includes password cracking.
BeEF
- The Browser Exploitation Framework tries to break into servers through websites.
Cisco Global Exploiter
-
Attacks Cisco routers and switches.
Ettercap
- A traffic interceptor designed for man-in-the-middle attacks.
Foremost
- A command-line disk copying and file recovery tool.
Hashcat
- A password cracker.
Hydra
- A password cracker.
John the Ripper
- A command-line password cracker.
Kismet
- A network scanner, packet sniffer, and intrusion detection system for wireless networks.
Maltego
- A data discovery tool that maps relationships between data, including network layouts, social media connections, and software dependencies.
Metasploit
- Framework Scans targets for endpoints and then builds attacks based on discovered knowledge.
Nikto
- A command-line Web vulnerability scanner.
Nmap
- A command-line network scanner and device discovery tool.
OWASP ZAP
- The Zed Attack Proxy is a Web vulnerability scanner and traffic interceptor.
sqlmap
- A command-line service for web vulnerability scanning and password cracking.
Wireshark
- A world-famous packet sniffer.
WPScan
- A vulnerability scanner for WordPress sites.
Is Ethical Hacking Legal?
Ethical hacking is also legal because hackers use a passive technique to check the vulnerabilities of a computer or computer network. The hackers do not use techniques that will harm the computer or network. The hackers research using data and viewing website's encryption details to check for weaknesses.
Please feel free to contact me if you have any questions.