1. Hackers are
innocent
in present time everybody is want to know each other personal
information and then the question is that how can we do it ,and the
answer is simple we can do it by hacking.
But on the same time the question is that hackers are innocent or
not?
In the world many type hackers are live some are use their skills for
good and some are use for money if we see technically then we
found that there r have 70% hackers who use their skills for money
and 30%USE THEIR SKILLS FOR GOOD things.
2. Latest hacking tools list
The Social-Engineer Toolkit (SET) v4.7 released
Biggest password cracking wordlist with millions of words
Phrozen Keylogger Lite v1.0 download
Pentoo 2013.0 RC1.1 Released
Snort 2.9.4.1 - Network intrusion detection system
Recon-ng : Web Reconnaisance framework for Penetration testers
Unhide Forensic Tool, Find hidden processes and ports
WAppEx v2.0 : Web Application exploitation Tool
Password Cracker Tool Hashkill version 0.3.1 released
Weevely : Stealth PHP web shell with telnet style console
Automated HTTP Enumeration Tool
BlindElephant – Web Application Fingerprinting
PwnStar latest version with new Exploits released
PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS
NetSleuth : Open source Network Forensics And Analysis Tools
TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
PySQLi - Python SQL injection framework
ExploitShield Browser Edition - Forget about browser vulnerabilities
Joomscan updated - now can identify 673 joomla vulnerabilities
3. List of top 10 hackers in world
• Kevin david mitnick
• He is an American citizen ,at the age of 16.Kevin first gained unauthorized access to a computer network in 1979.He fame to hacked the computer systems of Digital
Equipments Corporation(DEC) used for developing their operating system software.
• Kevin Poulsen
• He is a news editor at wired.com.Before entering into journalism ,he was a notorious hacker in the world. Those who cheat the technology for personal gain he is a black
hat who hacked the phone lines of los angeles radio station KIIS-FM.
• Adrian Lamo
• Adrian was born in boston ,He was a homeless hacker .You know why he is nicknamed as homeless hacker he used internet café,liberies and coffee shop as his location
for hacking. He gained to breaking into a series of high profile computer software and networks like the new York times, yahoo and Microsoft.
• Michael Calce
• Michael was the internet alias mafia boy. He gained a series of highly known denial of service attacks against the websites like yahoo!,fifa.com,amazon.com,dell.com
eBay.
• Albert Gonzalez
• Albert has been convicted masterminding the biggest credit card and ATM criminal in the world ,Albert and his team used the SQL injection to create hacking several
corporate system in order to launch packet sniffing attacks.
• Vladimir Levin
• He is a Russian citizen .This hacker done his hacking through the citi bank.While working from his apartment in st. petersburg the talented hacker transferred $10 million
from the account of Citibank clients to his own account.
• Robert tappan morris
• Buddies, Have you heard about morries worm ?Considered the first computer worm on the internet. That the worm is created by our Robert tappan. This hacker was done
the worth of $ 15 damage by using his worm.
• David Smith
• Melissa its an infamous e-mail virus is due to being the author is none another than David Smith. That the virus takes convert to it was originally hidden in a file that
contained password of 80 fame pornography websites.
• George Hotz
• He is an American hacker known for unlocking the iphone .He is the first person to hack the Sony play station 3.This is the most hacking attention in his future.
• Jonathan James
• 16 –year –old black hat hacker in the United States. He gained to implementing a series of successful intrusion into various system. He was well talented in hacking
government systems such as NASA and the department of defense. But he is no more .
4. hackers are always need smart phones
like:
0%
20%
40%
60%
80%
100%
1st
Qtr
2nd
Qtr
3rd
Qtr
4th
Qtr
gray hat
black hat
white hat
5. list of ethical hacking chapters
(including tools and everthing)
• Bluetooth
• BlueScanner
• Bluesnarfer
• BlueSniper Rifle
• Blooover
• Bluejacking community site
• BTScanner for XP
• Car Whisperer
• Detailed presentation on the various Bluetooth attacks
• NIST Special Publication 800-48
• Smurf
• Certifications
• Certified Ethical Hacker
• Certified Information Security Manager
• Certified Information Systems Security Professional
• Certified Wireless Security Professional
• CompTIA Security+
• SANS GIAC
• Databases
• Advanced Access Password Recovery
• Advanced SQL Password Recovery
• AppDetectivePro
• Elcomsoft Distributed Password Recovery
• Microsoft SQL Server Management Studio Express
• NGSSQuirreL
• Pete Finnigan's listing of Oracle scanning tools
• QualysGuard
• SQLPing3 and SQLRecon
• Exploit tools
• Metasploit
• Milw0rm
• General research tools
• AfriNIC
• APNIC
• ARIN
• Bing
• DNSstuff.com
• dnstools.com
• The File Extension Source
• Google
• Government domains
• Hoover's business information
• Log analysis
• ArcSight Logger
• GFI EventsManager
• LogAnalysis.org system logging resources
• Messaging
• Abuse.net SMTP relay checker
• Brutus
• Cain & Abel
• DNSstuff.com relay checker
• EICAR Anti-Virus test file
• GFI e-mail security test
• mailsnarf
• smtpscan
• Miscellaneous tools
• FreeZip
• WinZip
• NetWare
• Craig Johnson's BorderManager resources
• JRB Software
• NetServerMon
• Pandora
• Rcon program
• Remote
• UserDump
• Networks
• Arpwatch
• Blast
• Cain & Abel
• CommView
• dsniff
• Essential NetTools
• ettercap
• Firewalk
• Getif
• GFI LANguard
• IETF RFCs
• IKEcrack
• MAC address vendor lookup
• MAC Changer
• Nessus vulnerability scanner
• Netcat
• Netfilter/iptables
6. • Patch management
• BigFix Patch Management
• Debian Linux Security Alerts
• Ecora Patch Manager
• GFI LANguard
• Linux Kernel Updates
• Lumension Patch and Remediation
• Novell Patches and Security
• Microsoft TechNet Security Center
• Red Hat Linux Security Alerts
• Slackware Linux Security Advisories
• SUSE Linux Security Alerts
• Windows Server Update Services from Microsoft
• Security education and learning resources
• Kevin Beaver's information security articles, whitepapers, webcasts, podcasts
, and screencasts
• Kevin Beaver's Security On Wheels information security audio programs
• Kevin Beaver's Security On Wheels blog
• Kevin Beaver's Twitter page
• Security methods and models
• Open Source Security Testing Methodology Manual
• OWASP
• SecurITree
• Software Engineering Institute's OCTAVE methodology
• Source-code analysis
• Checkmarx
• Fortify Software
• Klocwork
• Ounce Labs
• Storage
• CHAP Password Tester
• CIFSShareBF
• Effective File Search
• FileLocator Pro
• GFI LANguard
• Google Desktop
• GrabiQNs
• Identity Finder
• NASanon
• StorScan
• SuperScan
• System hardening
• Bastille Linux Hardening Program
• User awareness and training
• Awareity MOAT
• Dogwood Management Partners Security Posters
• Greenidea Visible Statement
• Interpact, Inc. Awareness Resources
• Managing an Information Security and Privacy Awareness and Training
Program by Rebecca Herold (Auerbach)
• NIST Awareness, Training, & Education resources
• Security Awareness, Inc.
• Voice over IP
• Cain & Abel
• CommView
• Listing of various VoIP tools
• NIST's SP800-58 document
• OmniPeek
• PROTOS
• sipsak
• SiVuS
• vomit
• VoIP Hopper
• Vulnerability databases
• Common Vulnerabilities and Exposures
• CWE/SANS Top 25 Most Dangerous Programming Errors
• National Vulnerability Database
• Privacy Rights Clearinghouse's A Chronology of Data Breaches
• SANS Top 20 Internet Security Problems, Threats, and Risks
• US-CERT Vulnerability Notes Database
• Wireless Vulnerabilities and Exploits
• Web applications
• Absinthe
• Acunetix Web Vulnerability Scanner
• Brutus
• Defaced Web sites
• HTTrack Website Copier
• Firefox Web Developer
• Foundstone's Hacme Tools
• Google Hack Honeypot
• Google Hacking Database
• NGSSquirrel
• N-Stealth Web Application Security Scanner
• Paros Proxy
• Port 80 Software's ServerMask
• SiteDigger
7. • Created by: mohammad danish
• Speiical thanks:md craetions
• We hope u like it!
Notes de l'éditeur
Bluetooth BlueScanner Bluesnarfer BlueSniper Rifle Blooover Bluejacking community site BTScanner for XP Car Whisperer Detailed presentation on the various Bluetooth attacks NIST Special Publication 800-48 Smurf Certifications Certified Ethical Hacker Certified Information Security Manager Certified Information Systems Security Professional Certified Wireless Security Professional CompTIA Security+ SANS GIAC Databases Advanced Access Password Recovery Advanced SQL Password Recovery AppDetectivePro Elcomsoft Distributed Password Recovery Microsoft SQL Server Management Studio Express NGSSQuirreL Pete Finnigan's listing of Oracle scanning tools QualysGuard SQLPing3 and SQLRecon Exploit tools Metasploit Milw0rm General research tools AfriNIC APNIC ARIN Bing DNSstuff.com dnstools.com The File Extension Source Google Government domains Hoover's business information LACNIC Military domains Netcraft's What's that site running? RIPE Network Coordination Centre Switchboard.com U.S. Patent and Trademark Office US Search.com U.S. Securities and Exchange Commission Wotsit's Format Whois.net Whatismyip.com Yahoo! Finance Zabasearch Hacker stuff 2600 The Hacker Quarterly Computer Underground Digest Hacker T-shirts, equipment, and other trinkets Hackin9 Honeypots: Tracking Hackers The Online Hacker Jargon File PHRACK Keyloggers Invisible KeyLogger Stealth KeyGhost SpectorSoft Laws and regulations Gramm -Leach-Bliley Act (GLBA) Safeguards Rule Health Information Technology for Economic and Clinical Health (HITECH) Act Health Insurance Portability and Accountability Act (HIPAA) Security Rule Payment Card Industry Data Security Standard ( PCI DSS) U.S. state breach notification laws Linux BackTrack freshmeat.net GFI LANguard Linux Security Auditing Tool (LSAT) QualysGuard SourceForge THC-Amap Tiger Live toolkits BackTrack Comprehensive listing of live bootable Linux toolkits Knoppix Network Security Toolkit Security Tools Distribution Log analysis ArcSight Logger GFI EventsManager LogAnalysis.org system logging resources Messaging Abuse.net SMTP relay checker Brutus Cain & Abel DNSstuff.com relay checker EICAR Anti-Virus test file GFI e-mail security test mailsnarf smtpscan Miscellaneous tools FreeZip WinZip NetWare Craig Johnson's BorderManager resources JRB Software NetServerMon Pandora Rcon program Remote UserDump Networks Arpwatch Blast Cain & Abel CommView dsniff Essential NetTools ettercap Firewalk Getif GFI LANguard IETF RFCs IKEcrack MAC address vendor lookup MAC Changer Nessus vulnerability scanner Netcat Netfilter/iptables NetResident NetScanTools Pro Nmap port scanner NMapWin OmniPeek Port number listing Port number lookup PortSentry PromiscDetect QualysGuard vulnerability scanner SMAC MAC address changer SNARE sniffdet SNMPUTIL SuperScan port scanner TCP Wrappers TrafficIQ Pro UDPFlood WhatIsMyIP Wireshark Password cracking Advanced Archive Password Recovery BIOS passwords Brutus Cain & Abel Crack Default vendor passwords Dictionary files and word lists: ftp:// ftp.cerias.purdue.edu/pub/dict ftp:// ftp.ox.ac.uk /pub/wordlists http:// packetstormsecurity.nl /Crackers/wordlists http://www.outpost9.com/files/WordLists.html http://rs159.rapidshare.com/files/184075601/BlackKnightList.rar Elcomsoft Distributed Password Recovery Elcomsoft System Recovery John the Ripper ophcrack Pandora Password Safe Proactive Password Auditor Proactive System Password Recovery pwdump3 NetBIOS Auditing Tool NIST Guide to Enterprise Password Management NTAccess RainbowCrack Rainbow tables SQLPing3 TSGrinder WinHex Patch management BigFix Patch Management Debian Linux Security Alerts Ecora Patch Manager GFI LANguard Linux Kernel Updates Lumension Patch and Remediation Novell Patches and Security Microsoft TechNet Security Center Red Hat Linux Security Alerts Slackware Linux Security Advisories SUSE Linux Security Alerts Windows Server Update Services from Microsoft Security education and learning resources Kevin Beaver's information security articles, whitepapers, webcasts , podcasts , and screencasts Kevin Beaver's Security On Wheels information security audio programs Kevin Beaver's Security On Wheels blog Kevin Beaver's Twitter page Security methods and models Open Source Security Testing Methodology Manual OWASP SecurITree Software Engineering Institute's OCTAVE methodology Source-code analysis Checkmarx Fortify Software Klocwork Ounce Labs Storage CHAP Password Tester CIFSShareBF Effective File Search FileLocator Pro GFI LANguard Google Desktop GrabiQNs Identity Finder NASanon StorScan SuperScan System hardening Bastille Linux Hardening Program Center for Internet Security Benchmarks Deep Freeze Fortres 101 How to disable SMTP relay on various e-mail servers Imperva Linux Administrator's Security Guide PGP Whole Disk Encryption Pyn Logic SecureIIS ServerDefender TrueCrypt User awareness and training Awareity MOAT Dogwood Management Partners Security Posters Greenidea Visible Statement Interpact, Inc. Awareness Resources Managing an Information Security and Privacy Awareness and Training Program by Rebecca Herold (Auerbach) NIST Awareness, Training, & Education resources Security Awareness, Inc. Voice over IP Cain & Abel CommView Listing of various VoIP tools NIST's SP800-58 document OmniPeek PROTOS sipsak SiVuS vomit VoIP Hopper Vulnerability databases Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous Programming Errors National Vulnerability Database Privacy Rights Clearinghouse's A Chronology of Data Breaches SANS Top 20 Internet Security Problems, Threats, and Risks US-CERT Vulnerability Notes Database Wireless Vulnerabilities and Exploits Web applications Absinthe Acunetix Web Vulnerability Scanner Brutus Defaced Web sites HTTrack Website Copier Firefox Web Developer Foundstone's Hacme Tools Google Hack Honeypot Google Hacking Database NGSSquirrel N-Stealth Web Application Security Scanner Paros Proxy Port 80 Software's ServerMask SiteDigger SWFScan WebInspect WebGoat WSDigger WSFuzzer Windows DumpSec GFI LANguard Microsoft Baseline Security Analyzer Network Users QualysGuard Sysinternals Winfo Wireless networks Aircrack AirMagnet WiFi Analyzer AirSnort Asleap Cantenna war-driving kit CommView for Wi-Fi Digital Hotspotter Elcomsoft Wireless Security Auditor Homebrew WiFi antenna KisMAC Kismet NetStumbler OmniPeek SeattleWireless Hardware Comparison page Super Cantenna Wellenreiter WEPCrack WiGLE database of wireless networks WifiMaps WiFinder WildPackets' OmniPeek WinAirsnort