Nmap (Network Mapper)
Browse / Ethical Hacking Tools Cheatsheet
Ethical Hacking Tools Cheatsheet
A comprehensive cheat sheet covering essential tools used in ethical hacking, their functionalities, and common use cases. This serves as a quick reference for penetration testers and security professionals.
Reconnaissance Tools
Network Scanning
|
|
A versatile tool for network discovery and security auditing. It can identify hosts, services, operating systems, and firewall rules. Usage: |
|
Zenmap |
The GUI version of Nmap, providing a user-friendly interface for complex scans and visualizing network topologies. Usage: Launch Zenmap and configure scan profiles. |
|
Masscan |
A high-speed port scanner designed for scanning large networks quickly. Usage: |
|
Netdiscover |
An active/passive ARP reconnaissance tool. Usage: |
|
Hping3 |
A command-line packet analyzer/assembler. Usage: |
Vulnerability Scanning
|
Nessus |
A comprehensive vulnerability scanner that identifies security flaws, missing patches, and malware. Usage: Configure scan policies and target IPs via the Nessus web interface. |
|
OpenVAS |
An open-source vulnerability scanner that performs comprehensive security assessments. Usage: Set up scan targets and schedules via the OpenVAS web interface. |
|
Nikto |
A web server scanner which performs comprehensive tests against web servers for multiple items, including dangerous files/CGIs, outdated server software and other problems. Usage: |
Web Reconnaissance
|
Dirbuster |
A Java application used to brute-force directories and files on web servers. Usage: Configure the target URL and wordlist in Dirbuster’s GUI. |
|
Wappalyzer |
A browser extension that identifies technologies used on a website. Usage: Install the Wappalyzer extension and visit the target website. |
|
WhatWeb |
A website fingerprinting tool that identifies technologies and CMS versions. Usage: |
Exploitation Tools
Exploitation Frameworks
|
Metasploit |
A powerful framework for developing and executing exploit code against a remote target. Usage: |
|
Armitage |
A GUI front-end for Metasploit, simplifying exploit selection and management. Usage: Launch Armitage and connect to a Metasploit instance. |
|
Core Impact |
A commercial penetration testing tool that automates vulnerability assessment and exploitation. Usage: Configure targets and run automated assessments via the Core Impact GUI. |
Web Application Exploitation
|
Burp Suite |
An integrated platform for performing security testing of web applications. Usage: Configure Burp Suite as a proxy and intercept web traffic to analyze and modify requests. |
|
OWASP ZAP |
A free, open-source web application security scanner. Usage: Configure ZAP as a proxy and use automated or manual testing features. |
|
SQLMap |
An automated SQL injection tool that detects and exploits SQL injection vulnerabilities. Usage: |
Password Cracking
|
John the Ripper |
A fast password cracker that supports multiple hash types. Usage: |
|
Hashcat |
An advanced password recovery tool with GPU acceleration. Usage: |
Post-Exploitation Tools
Privilege Escalation
|
LinEnum.sh |
A script to enumerate information from Linux systems for privilege escalation. Usage: Transfer the script to the target, make it executable, and run it. |
|
Windows Exploit Suggester (wes.py) |
A Python script to suggest potential exploits for Windows systems based on patch levels. Usage: Run the script against systeminfo output. |
Data Extraction
|
Mimikatz |
A tool to extract plaintext passwords, hash, PIN codes and kerberos tickets from memory. Usage: Load Mimikatz module in Metasploit or run directly on the target. |
|
PowerShell Empire |
A post-exploitation framework for PowerShell, enabling data exfiltration and persistence. Usage: Set up Empire server and agents on the target. |
Maintaining Access
|
Reverse Shells |
Establish a reverse shell for persistent access. Example: |
|
Cron Jobs |
Schedule tasks for persistent access. Usage: |
Wireless Hacking Tools
Wireless Reconnaissance
|
Aircrack-ng Suite |
A complete suite of tools for wireless network assessment. Tools: |
|
Kismet |
A wireless network detector, sniffer, and intrusion detection system. Usage: Run Kismet to passively collect wireless network data. |
Wireless Exploitation
|
Aireplay-ng |
Used to inject packets, useful for deauthenticating clients or generating traffic. Usage: |
|
Aircrack-ng |
Used to crack WEP and WPA/WPA2-PSK keys. Usage: |
Bluetooth Hacking
|
Bluelog |
Discovers Bluetooth devices. Usage: Run Bluelog to scan for nearby Bluetooth devices. |
|
Bluesnarfer |
Exploits Bluetooth vulnerabilities to access data. Usage: Bluesnarfer target_MAC |