The Hackers Tools - A Hacker's Life Starter: Security Penetration Anywhere & Anytime (2014)

A Hacker's Life Starter: Security Penetration Anywhere & Anytime (2014)

Chapter 2. The Hackers Tools

We will cover :

* Backtrack

* Wireshark

* Vadilia Tor

* Getting familiar with viruses

* Keylogger

A hacking tool is a program designed to help with hacking, or software which can be used for hacking achievements. Most of these many software are open source. You can download them for free at their web site and use them for the experimenting.

In this chapter we will do a light introduction on the few of the most recognized and strong hacking tools. Just try to get familiar with them as much as you can. Each time you master one of these tools in the future you will increase your skills as a white/black hat hacker.

Backtrack

In this book we will use Backtrack as much as we can because it offers numbers of methods for cracking inside a system with ease. Backtrack is an open source operating system that can be booted from a live CD or USB with no requiring for installation. Also, permanent installation to the network or HDD is easy achievable. In chapter 5 we will cover more in depth with backtrack and its use for sniffing and cracking inside systems(see Figure 2-1).

Backtrack already comes with a number of hacking tools or security tools already installed inside the OS. Backtrack is well known for cracking and hacking on computers.

BackTrack's tools are organized into 12 categories:

* Information Gathering

* Vulnerability Assessment

* Exploitation Tools

* Privilege Escalation

* Maintaining Access

* Reverse Engineering

* RFID Tools

* Stress testing

* Forensics

* Reporting Tools

* Services

* Miscellaneous

In Figure 2-1 .shows you how backtrack will look like while searching for packets .

Wireshark

Wireshark is another tool used to sniff WIFI/online account passwords and packets out there. Basically what it does it captures packets from connections inside the network. And, can be used for security.

This small software is completely open source, can be completely downloaded at http://www.wireshark.org. Wireshark was made for finding network troubleshooting, communications protocol development.

How it works

It's a network analyzer like a measuring device for examining inside a network cable in real-time. (see Figure 2-2)

In Figure 2-2. shows you Wireshark analyzing the network LAN which can be used later to pick passwords.

Vadilia TOR

Tor is the world’s largest anonymity free service. It is used by common people, hackers and tech-security. With Tor you can easily hide your identity from others. It can be downloaded at www.torproject.org

For example if you actually lived in the United States and you hacked or accessed in another user PC with Tor turned on. If that user manages to track you back by your Ip address, he would find out that you live China or any other country. What I ‘am trying to say is that Tor cloaks your Ip for you fooling anyone else who’s tracking your location.

Battle against Tor

NSA has reportedly been trying to break into the Tor network for years. But Tor kept going and providing their service up until this moment because it seems Tor is really difficult to crackdown.

They did manage to get some information out of it (small number of nodes) but still wasn't enough though.

How it works

Tor routs internet traffic through several “onion” server. From this you get provided with anonymity. In the Tor configuration file application can be directed to the Tor network through socks proxy at local host. (see Figure 2-3)

In Figure 2-3 you can see Tor turned on providing the great service.

Getting familiar with viruses

Creating a computer virus or understanding it, is one of the most essential tool that a hacker could ever have achieved. You see a virus cannot only be used to damage the computer, but it also can be used to monitor or take screenshots of the infected operating system remotely. And on the other hand can be used to fix things.

Top 5 destructive computer viruses in History

Here are the five top viruses used that I think that shook the world:

* Melissa

* MYDoom

* Storm

* ILOVEYOU

* Code Red

In the next Chapter we will go a bit more in depth in how a virus is made and how to make one.

Keylogger

Knowing how to work with a keylogger is also useful especially when you will need to monitor users passwords. Basically key loggers are used in IT organization to find technical problems. But there are those who uses it for sniffing users passwords and others.

How it works

The word say it for itself, it logs keyboard keystrokes into a file , so it can be later found out later. Most key-logger store the data inside local hard drive. But there are some that sends in through the internet or the network remotely(see Figure 2-4).

In Figure 2-4 .shows you how backtrack will look like while searching for packets

Small summery ahead

* Backtrack comes with a number of hacking and security tools already installed with the OS.

* Wireshark is mostly used for capturing packets from the network to have a detailed look over it still can be used for hacking.

* Tor cloaks your ip and with that it makes it difficult that they can find the real ip

* Keylogger is used to monitor what the user is typing on his keyboard.