Friday, June 2, 2017

Top 10 Best Free Hacking Tools Of 2016/2017 For Windows and Linux

There are lots of hacking tools are available on the internet. But many of those hacking tools are the virus and some are fake. So, how will you find top best free hacking tools for your PC?

Here we make a list of top 10 best free hacking tools for windows and Linux PC. You can use these tools in your PC for pen testing and ethical hacking purpose.
Top 10 Best Free Hacking Tools Of 2016 For Windows and Linux

Top 10 Best Free Hacking Tools Of 2016 For Windows and Linux

1. Nmap

Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free,open source and free hacking tool.
Nmap Port Scanner

2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations worldwide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Nessus Remote Security Scanner 
 
3. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
 John the Ripper

4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on HTTP fingerprinting or Google hacking/info gathering etc, another article for just those).
Nikto Tool 
 

5. Acunetix – Web Vulnerability Scanner

It is a powerful online tool to scan your website and get you site hackable report. Most of the sites on internet are vulnerable so guys we need to secure our sites. Acunetix Vulnerability Scanner automatically crawls and scans off-the-shelf and custom-built websites and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 3000 other web vulnerabilities.
Acunetix – Web Vulnerability Scanner

6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically, it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
p0f Fingerprinting OS Tool 
 

7. Wireshark

Wireshark is one of best hacking tools 2016 a GTK+-based network protocol analyzer wifi hacking tool, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! and is the best wifi hacking tool.
Wireshark

8. Metasploit:

A tool for exploiting (Utilizing network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pen testing (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.
Metasploit - Penetration Testing Tool

9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
Create Task in Eraser for Deleting File

10.  Social Engineer Toolkit – Human are so dumb:

The Social Engineer Toolkit incorporates many useful social-engineering attacks all in one interface. The main purpose of SET is to automate and improve on many of the social-engineering attacks out there. It can automatically generate exploit-hiding web pages or email messages, and can use Metasploit payloads to, for example, connect back with a shell once the page is opened.
Social Engineer Toolkit
Social Engineer Toolkit
To download SET on Linux, type the following command.
git clone https://github.com/trustedsec/social-engineer-toolkit/ set/
Apart from Linux, Social-Engineer Toolkit is partially supported on Mac OS X and Windows.
So, these are the top best free hacking tools 2016 for computer/PC. These tools are must for every hacker. If you are a newbie then you can search for their tutorial on the internet

5 Most Dangerous Computer Viruses of all time

They’re created by malicious programmers who might want to use your computer to attack other targets, or make money by stealing your personal information. They could also just be trying to see how far their virus will spread.
Different viruses can affect Windows, Mac and Linux computers, and even the data servers that keep companies, and the internet itself, running.
Antivirus programs help, but they can have trouble dealing with threats they’ve never seen before.Over the years, there have been thousands and thousands of viruses spread online, and they’ve caused billions of dollars of damage from lost productivity, wasted resources, and broken machines.
A few dozen of those viruses stand out, some spread especially quickly, or affected a lot of people, or created a ton of damage all by themselves. Some did all of the above.
Since a lot of viruses were very bad, in a lot of different ways, it’s hard to pick out which ones were objectively the worst.
Here are five most dangerous computer viruses of all time:

1. ILOVEYOU

Perhaps the most virulent computer virus ever created, the ILOVEYOU virus managed to wreck PCs all across the world. Infecting almost 10% of the world’s PCs connected to the Internet, the virus caused a total damage of around $10 billion.
The virus apparently got transmitted via email with a subject line “ILOVEYOU,” which is a radical human emotion that no one can ignore. To make it even more alluring, the email contained an attachment that read something like this: Love-Letter-For-You.TXT.vbs. The moment someone opened the file, the virus emailed itself to the first 50 contacts available in the PC’s Windows address book.

2. Melissa

Melissa became the breaking news on March 26, 1999, after hitting the new age of emailing. Built by David L, Melissa was spread in the form of an email attachment by the name “list.doc.”

When a person clicked upon the attachment, the virus would find the Microsoft Outlook address book and email itself to the first 50 contacts on the list having a message “Here is that document you asked for…donot show anyone else.” Later on, FBI arrested David L and slapped him with a fine of $5000 for creating the wildest virus of its time.

3. My Doom

My Doom hit the malware world in 2004 and spread exponentially through email with random addresses of senders and subject lines. Infecting somewhere around two million PCs, My Doom smashed the cyber world by instigating a tremendous denial of service attack. It transmitted itself via email in a specially deceitful way that a receiver would first consider a bounced error message that read “Mail Transaction Failed.”
However, as soon as the receiver clicked upon the message, the attachment executed and the worm transmitted to email addresses found in the user’s address book. It is easy to believe that this mass mailer worm caused a damage of almost $38 billion.

4. Code Red

Taking advantage of the Microsoft Internet Information Server’s flaw, Code Red spread on the network servers in 2001. Here is an amusing fact about this dangerous virus—it didn’t need you to open an email attachment or execute a file; it just required an active Internet connection with which it ruined the Web page that you opened by displaying a text “Hacked by Chinese!” It’s no surprise that this virus devastated nearly $2.6 billion dollars by hitting almost one million PCs.
And in less than a week’s time, the virus brought down over 400,000 servers that included the White House Web server as well.

5. Sasser

Sasser was a Windows worm that was discovered in 2004. Apparently, it would slow down and crash the PC, making it even hard to reset without cutting the power. And its effects were surprisingly troublesome as well, with millions of PCs being infected and crucial, significant infrastructure affected.
The worm played on a buffer overflow susceptibility in Local Security Authority Subsystem Service (LSASS) that monitors the safety policy of local accounts causing crashes to the PC. The devastating effects of the virus were massive resulting in over a million infections. This included critical infrastructures, such as new agencies, hospitals, airlines, and public transportation.
Computers are amazing, but they just do what they’re told, and when viruses tell them to do bad things, it can create a lot of damage.