This section focuses on the variety of hacking tools that can be used during your hacking adventures. It won’t cover every tool or even every functionality of a single tool. However, it should be enough to get you started using the tools. The majority of tools can be found on Github.
Hacking Tools: NmapDear friend, welcome to HaXeZ where today I’m going to be talking about the network mapping tool Nmap. Nmap is a network scanner and was created by Gordon Lyon. It can be used to discover hosts on a network by sending packets to those hosts and then analyzing the responses. In other words, it can help you map out a target network. As a result, Nmap among other tools like Mass Scan is an essential tool for your ethical hacking tool kit. I use it on almost every engagement.
Hacking Tools: MetasploitDear friend, welcome to HaXeZ where today we're talking about Metasploit. The Metasploit framework is an essential tool for any aspiring hacker or penetration tester. It comes preinstalled on many penetration testing distributions including Kali Linux. It is a framework that allows the user to select from a plethora of powerful tools. Furthermore, the user can then configure those tools with various options including the target's IP address and port number. <br /> <br /> 0:00 Introduction<br /> 1:18 Getting Started<br /> 3:26 Modules<br /> 9:33 Module Configuration<br /> 15:09 Sessions<br /> 18:48 Workspaces<br /> 21:07 Conclusions<br /> <br /> <br /> Music from https://www.bensound.com/
Hacking Tools: HydraHello World and welcome to HaXeZ, today we’re talking about the brute forcing tool THC Hydra. According to Wikipedia, Hydra is a parallelized network logon cracker. It is available on a number of Penetration Testing Linux distributions such as Kali Linux, Parrot OS, Black Arch, and BackBox. Hydra has the ability to perform attacks against various different network services including Remote Desktop, Secure Shell, File Transfer Protocol, Samba, and many others. It is also capable of performing brute force attacks against web applications.<br /> <br /> Music - bensounds.com<br /> <br /> 0:00 introduction<br /> 02:20 Installing Hydra<br /> 03:20 Hydra Options<br /> 06:00 Brute Forcing RDP<br /> 12:00 Brute Forcing SSH<br /> 15:20 Brute Forcing FTP<br /> 16:50 Brute Forcing SMB<br /> 18:00 Brute Forcing Web Applications<br /> 20:00 Hydra GUI<br /> 29:40 Conclusions
Hacking Tools: John The RipperHello World and welcome to HaXez, the game's afoot and in this post, I'm going to be talking about my favorite password-cracking tool, John The Ripper. John the Ripper is a multi-platform password cracking tool that can crack various password hashes. It was developed by OpenWall and was initially released in 1996. I believe John The Ripper got its name from another hacking tool called Jack The Cracker, or Cracker Jack. Anyway, you're not here to read a reworded Wikipedia article.<br /> <br /> Music bensounds.com<br /> <br /> 00:00 Introduction<br /> 00:28 About John The Ripper<br /> 01:15 Installing John The Ripper<br /> 02:25 John The Ripper Supported Hashes<br /> 03:45 John The Ripper Cracking Modes<br /> 08:35 Identifying Hashes<br /> 10:50 Getting Wordlists<br /> 12:40 Cracking MD5 Hashes With John The Ripper<br /> 15:50 Cracking SHA1 Hashes With John The Ripper<br /> 17:00 Cracking SHA256 Hashes With John The Ripper<br /> 18:20 Cracking Whirlpool Hashes With John The Ripper<br /> 19:10 Cracking MD4 Hashes With John The Ripper<br /> 20:45 Viewing John.pot<br /> 23:00 Conclusions
Pwnhub publishes videos containing demonstrations on hacking into computers. The target computers are all part of lab environments provided by various different vendors. These vendors have given their permission for us to hack into these machines as their purpose is for education. You should not hack any devices that you don’t own or have permission to hack.