This chapter is a final implementation of all the concepts we have learned in
this book. There are a lot of hacking tools available now. Linux Distro Kali
Linux provides approximately 350 tools from various categories. We will in
this chapter discuss some of the famous hacking tools that are used for web
hacking, network hacking, and password cracking. Remember that hacking
tools are just an easy interface that will let us complete our work fastly and
efficiently. Good hackers don't always rely on tools but create their tools to
exploit the system as soon as can. However, hacking tools are better options
for security testing and other tasks like fingerprinting or brute-forcing. We
will now discuss some of the hacking tools in detail. Let's get started!
Burp Suite
In today's world web applications are the most attacked ones by hackers.
They are somewhat easy to break into when compared to network systems
and can be easily manipulated to cash out easy money or sensitive
information.
Hackers use brute force tools like Hydra that are available in Linux to brute
force (that is to send a lot of requests automatically) login pages. Security
researchers should test web applications in depth to clear any vulnerabilities
that are present .
To make this vulnerability testing process smooth and easy port swigger has
created a tool named as burp suite that has been white hat hackers favorite
since then. In this section, we will discuss the components of the burp suite
in detail. Let us start!
Note: Burp Suite is a tool that can be used by hackers to manipulate pages.
So always take the permission of the website owners that you are trying to
experiment on. Otherwise, you can use sample test websites that are
available either online or as Linux iso.