www.tutorialspoint.com › kali_linux › kali_linux_password_cracking_tools. If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. The “rockyou” wordlist found in Kali Linux was used. How to crack a password via a dictionary attack. 1. Create a dictionary with MBD5 hashes. To start.
echo -n “MYSECRET” md5sum tr -d ” -” >> target_hashes.txt
echo -n “S3CuReP455Word”
21 Best Kali Linux Tools for Hacking and Penetration Testing
Here’s our list of best Kali Linux tools that will allow you to assess the security of web-servers and help in performing hacking and pen-testing.
If you read the Kali Linux review, you know why it is considered one of the best Linux distributions for hacking and pen-testing and rightly so. It comes baked in with a lot of tools to make it easier for you to test, hack, and for anything else related to digital forensics.
It is one of the most recommended Linux distro for ethical hackers. Even if you are not a hacker but a webmaster – you can still utilize some of the tools to easily run a scan of your web server or web page.
In either case, no matter what your purpose is – we shall take a look at some of the best Kali Linux tools that you should be using.
Note that not all tools mentioned here are open source.
Top Kali Linux Tools for Hacking and Penetration Testing
There are several types of tools that comes pre-installed. If you do not find a tool installed, simply download it and set it up. It’s easy.
Nmap or “Network Mapper” is one of the most popular tools on Kali Linux for information gathering. In other words, to get insights about the host, its IP address, OS detection, and similar network security details (like the number of open ports and what they are).
It also offers features for firewall evasion and spoofing.
Lynis is a powerful tool for security auditing, compliance testing, and system hardening. Of course, you can also utilize this for vulnerability detection and penetration testing as well.
It will scan the system according to the components it detects. For example, if it detects Apache – it will run Apache-related tests for pin point information.
WordPress is one of the best open source CMS and this would be the best free WordPress security auditing tool. It’s free but not open source.
If you want to know whether a WordPress blog is vulnerable in some way, WPScan is your friend.
In addition, it also gives you details of the plugins active. Of course, a well-secured blog may not give you a lot of details, but it is still the best tool for WordPress security scans to find potential vulnerabilities.
Aircrack-ng is a collection of tools to assess WiFi network security. It isn’t just limited to monitor and get insights – but it also includes the ability to compromise a network (WEP, WPA 1, and WPA 2).
If you forgot the password of your own WiFi network – you can try using this to regain access. It also includes a variety of wireless attacks with which you can target/monitor a WiFi network to enhance its security.
If you are looking for an interesting tool to crack login/password pairs, Hydra will be one of the best Kali Linux tools that comes pre-installed.
It may not be actively maintained anymore – but it is now on GitHub, so you can contribute working on it as well.
Wireshark is the most popular network analyzer that comes baked in with Kali Linux. It can be categorized as one of the best Kali Linux tools for network sniffing as well.
It is being actively maintained, so I would definitely recommend trying this out. And it’s really easy to install Wireshark on Linux.
7. Metasploit Framework
Metsploit Framework is the most used penetration testing framework. It offers two editions – one (open source) and the second is the pro version to it. With this tool, you can verify vulnerabilities, test known exploits, and perform a complete security assessment.
Of course, the free version won’t have all the features, so if you are into serious stuff, you should compare the editions here.
Similar to WPScan, but not just focused for WordPress. Skipfish is a web application scanner that would give you insights for almost every type of web applications. It’s fast and easy to use. In addition, its recursive crawl method makes it even better.
For professional web application security assessments, the report generated by Skipfish will come in handy.
Maltego is an impressive data mining tool to analyze information online and connect the dots (if any). As per the information, it creates a directed graph to help analyze the link between those pieces of data.
Do note, that this isn’t an open source tool.
It comes pre-installed, however, you will have to sign up in order to select which edition you want to use. If you want for personal use, the community edition will suffice (you just need to register for an account) but if you want to utilize for commercial purpose, you need the subscription to the classic or XL version.
If you have a computer connected to a network, Nessus can help find vulnerabilities that a potential attacker may take advantage of. Of course, if you are an administrator for multiple computers connected to a network, you can make use of it and secure those computers.
However, this is not a free tool anymore, you can try it free for 7 days on from its official website.
11. Burp Suite Scanner
Burp Suite Scanner is a fantastic web security analysis tool. Unlike other web application security scanner, Burp offers a GUI and quite a few advanced tools.
However, the community edition restricts the features to only some essential manual tools. For professionals, you will have to consider upgrading. Similar to the previous tool, this isn’t open source either.
I’ve used the free version, but if you want more details on it, you should check out the features available on their official website.
BeEF (Browser Exploitation Framework) is yet another impressive tool. It has been tailored for penetration testers to assess the security of a web browser.
This is one of the best Kali Linux tools because a lot of users do want to know and fix the client-side problems when talking about web security.
Apktool is indeed one of the popular tools found on Kali Linux for reverse engineering Android apps. Of course, you should make good use of it – for educational purposes.
With this tool, you can experiment some stuff yourself and let the original developer know about your idea as well. What do you think you’ll be using it for?
If you were looking for an open source penetration testing tool – sqlmap is one of the best. It automates the process of exploiting SQL injection flaws and helps you take over database servers.
15. John the Ripper
John the Ripper is a popular password cracker tool available on Kali Linux. It’s free and open source as well. But, if you are not interested in the community-enhanced version, you can choose the pro version for commercial use.
Want real-time traffic analysis and packet logging capability? Snort has got your back. Even being an open source intrusion prevention system, it has a lot to offer.
The official website mentions the procedure to get it installed if you don’t have it already.
17. Autopsy Forensic Browser
Autopsy is a digital forensic tool to investigate what happened on your computer. Well, you can also use it to recover images from SD card. It is also being used by law enforcement officials. You can read the documentation to explore what you can do with it.
You should also check out their GitHub page.
18. King Phisher
Phishing attacks are very common nowadays. And, King Phisher tool helps test, and promote user awareness by simulating real-world phishing attacks. For obvious reasons, you will need permission to simulate it on a server content of an organization.
Nikto is a powerful web server scanner – that makes it one of the best Kali Linux tools available. It checks in against potentially dangerous files/programs, outdated versions of server, and many more things.
Yersinia is an interesting framework to perform Layer 2 attacks (Layer 2 refers to the data link layer of OSI model) on a network. Of course, if you want a network to be secure, you will have to consider all the seven layers. However, this tool focuses on Layer 2 and a variety of network protocols that include STP, CDP, DTP, and so on.
21. Social Engineering Toolkit (SET)
If you are into pretty serious penetration testing stuff, this should be one of the best tools you should check out. Social engineering is a big deal and with SET tool, you can help protect against such attacks.
There’s actually a lot of tools that comes bundled with Kali Linux. Do refer to Kali Linux’ official tool listing page to find them all.
You will find some of them to be completely free and open source while some to be proprietary solutions (yet free). However, for commercial purpose, you should always opt for the premium editions.
We might have missed one of your favorite Kali Linux tools. Did we? Let us know about it in the comments section below.
Like what you read? Please share it with others.
Filed Under: ListTagged With: Kali LinuxИсточник: [https://torrent-igruha.org/3551-portal.html]
The -n option removes the new line added to the end of “Password.” This is important as we don’t want the new line characters to be hashed with our password. The part “tr –d ‘ -‘ “ removes any characters that are a space or hyphen from the output.
2. Check password hashes
To do this, we need to type the following command line in the terminal:
This is also illustrated in the table below:
|root@kali:~/Desktop# cat target_hashes.txt |
3. Start Hashcat in Kali Linux
Hashcat can be started on the Kali console with the following command line: hashcat -h.
This is illustrated in the screenshot below:
Some of the most important hashcat options are -m (the hashtype) and -a (attack mode). In general, we need to use both options in most password-cracking attempts when using Hashcat.
Hashcat also has specifically designed rules to use on a wordlist file. The character list can be customized to crack the password(s).
Finally, Hashcat provides numerous options for password hashes that can be cracked. This can be seen in the screenshot below:
4. Choose the wordlist
Kali Linux has numerous wordlists built right into it. To find them, use the following command line: locate wordlists
This is illustrated in the screenshot below:
The “rockyou” wordlist is now used, as illustrated below:
|root@kali:~/Desktop# locate rockyou.txt|
5. Cracking the hashes
In the final step, we can now start cracking the hashes contained in the target_hashes.txt file. We will use the following command line, as illustrated below:
|root@kali:~/Desktop# hashcat -m 0 -a 0 -o cracked.txt target_hashes.txt /usr/share/wordlists/rockyou.txt|
- -m 0 designates the type of hash we are cracking (MD5)
- -a 0 designates a dictionary attack
- -o cracked.txt is the output file for the cracked passwords
- target_hashes.txt is our input file of hashes
- /usr/share/wordlists/rockyou.txt is the absolute path to the wordlist file for this dictionary attack
Finally, we have cracked five out of seven target hashes that were initially proposed. These can be seen below:
|root@kali:~/Desktop# cat cracked.txt|
These passwords are weak, and it does not take much effort or time to crack them. It is important to note that the simpler the password is, the easier it will be to detect.
Thus, make your password into a long and complex one. Avoid using obvious personal information; never reuse passwords, and change them regularly.
Additionally, there are some GUI that makes hashcat easy to use. Hashview is one of the projects. This is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. In detail, it is a web application that manages Hashcat commands.
How to Crack Passwords, Part 3 (Using Hashcat), null-byte.wonderhowto.com
KALI – How to crack passwords using Hashcat – The Visual Guide, uwnthesis.wordpress.com
How to Crack MD5 Hashes Using hashcat, 4ARMED
Hashcat Tutorial – Bruteforce Mask Attack Example for Password Cracking, Cyber Pratibha
Palavras-passe e Honey Words, Segurança Informática