Free Essay

It255 Hacking Tools Paper

In:

Submitted By anonymous123
Words 357
Pages 2
Hacking Tools Paper
A hacking tool is a program built for attackers to assist them in hacking. There are many different types of hacking tools. One of these hacking tools is called Nmap. Nmap is a security scanner that was originally designed by Gordon Lyon. It was built to find hosts and services on a network. Once it finds these hosts and services, it will then send packets to the target host and evaluate the responses. Nmap checks the network conditions during the packet run including latency fluctuations and congestion. It also figures out if a host is up or down and which ports are open or closed. Also, it can tell which operating system the target is using, the type of device and even the presence of a firewall.
Another popular hacking tool is called Nessus. Nessus is a vulnerability scanning program. It is a free program designed to detect potential vulnerabilities on systems. It checks for vulnerabilities such as misconfiguration, allowing a hacker to control or access data remotely, default passwords, dictionary attacks, denial of service attacks, and also provides preparation for PCI DSS audits. The way in which Nessus works is it does a port scan first to figure out which ports are open, and then tries to exploit them. All of the tests are written in Nessus Attack Scripting Language. It then produces dozens of new plugins every week and is tested/scanned on a regular basis. John the Ripper is another hacking tool out there. This one is a password cracker. John runs on fifteen different platforms. It is so popular because it combines multiple password crackers into one package. It automatically detects the password hash type and includes a customizable cracker. There are a couple different attack types that John can use. It can perform a dictionary attack (a technique for defeating a cipher). Also it can perform a brute force attack (where it will check all possibilities, hashing each one and comparing it), which is good for figuring out passwords not on the dictionary list. This method usually takes a long time so it is usually a last resort.

Similar Documents

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18