Network Penetration Testing Tools for Ethical Hacking

20 min n.w
1 / 11
Embed
Share

Explore a range of tools used in ethical hacking including Nmap, XRay, Wireshark, Hashcat, John the Ripper, Hydra, Aircrack-NG, Metasploit, and Nikto. Learn about network mapping, vulnerability scanning, traffic analysis, password cracking, and more.

  • Ethical Hacking
  • Network Security
  • Penetration Testing
  • Cybersecurity
  • Tools

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. 20 min NETWORK PENTESTING TOOLS WHAT DO YOU USE TO HACK? DAY 03

  2. Agenda NMAP XRAY WIRESHARK HASHCAT JOHN THE RIPPER HYDRA AIRCRACK-NG METASPLOIT NIKTO 2

  3. nmap NETWORK MAPPER PORT SCANNING BYDEFAULT, ONLY THETOP 1000TCP PORTS ALSO SCRIPTING ENGINE CAN DOBANNER ENUMERATION 3

  4. nmap nmaphackxpert.com nmap sc hackpert.com>> DEFAULT SCRIPTS nmap sv hackpert.com>> BANNER ENUMERATION nmap p-hackxpert.com>> SCAN ALL TCP PORTS nmap-u p-hackxpert.com>> SCAN ALL UDPPORTS nmap t4hackxpert.com>> TIMING TEMPLATE 4 (0 5) 4

  5. xray HTTPS://GITHUB.COM/CHAITIN/XRAY VULNERABILITY SCANNER XRAY WEBSCAN --BASIC-CRAWLER HTTP://HACKXPERT.COM --HTML-OUTPUT CRAWLER.HTML CAN RUN AS HTTP PROXY XRAY WEBSCAN --LISTEN127.0.0.1:7777--HTML-OUTPUTPROXY.HTML 5

  6. WIRESHArk ANALYSING TRAFFIC 6

  7. HASHCAT/JOHN THE RIPPER PASSWORD CRACKERS BRUTE FORCING HASHCAT IS FASTER AS IT USES GPU VM SCAN NOT USE GPU SO JOHN MIGHT BEBETTER MOSTLY BRUTEFORCING LOCAL FILES INTERNET REQUESTS ARE BETTER TESTED WITHHYDRA 7

  8. HYDRA HYDRA -LUSER -P PASSLIST.TXT FTP://HACKXPERT.COM FTP HTTP HTTPS SSH 8

  9. AIRCRACK-NG WIFI SECURITY ASESSMENT TOOL HTTPS://WWW.AIRCRACK-NG.ORG/ MONITORING: PACKET CAPTURE AND EXPORT OF DATA TO TEXT FILES FOR FURTHER PROCESSING BY THIRDPARTY TOOLS ATTACKING: REPLAY ATTACKS, DEAUTHENTICATION, FAKE ACCESS POINTS AND OTHERS VIA PACKET INJECTION TESTING: CHECKING WIFI CARDS AND DRIVER CAPABILITIES (CAPTURE AND INJECTION) CRACKING: WEP AND WPA PSK (WPA 1 AND 2) 9

  10. METASPLOIT AVOIDITIFYOUCAN FINDPOCSONLINE TRYTOMAKE YOUROWNPOCS IT SSKIDDIE-LIKE 10

  11. nikto VULNERABILITYSCANNER SCANALLWEB SERVERS ? NOT JUST POPULAR 80/443 PORTS NIKTO HOST 11

More Related Content