Skip to main content

Posts

Showing posts with the label man in the middle attack

Hackers, Who are they and why do they do it?

Watching the typical popular media portrayal of a hacker you are likely to see a socially awkward goofy individual either working in some dark basement or high tech office with six 42" LCD screens linked together into one large screen with Matrix like code flowing across the screen as they furiously type away as they get ready to launch some world ending computer virus. Reading or watching the news is likely to be a similar fair with news of a new banking Trojan or hacker group that have stolen millions of bank account records, social security numbers, and the like. On the surface level, hackers are all really bad people that should be locked up, so why learn how to hack?   The truth is there are many different types of hackers, some of which are very important to the health and integrity of private and corporate networks.   According to the EC-Council's Certified Ethical Hacking 9 certification hackers can be classified into 8 categories:   Black Hats: Individuals

ADVANCE WEB HACKING TOOLS

● Havij ●NetDatabaseScanner ●Open Web Spider ●Quick Web ●Site Hog ●Snippets Manager ●Spider Mail ●SQL Injection ●SQL Map Project ●The Mole ZeroTeam™ MD5 Password Encryptor ●Acunetix Web Vulnerability Scanner ●Advanced Deface Creator 1.3 ●Anonymous DNS Extractor-2013 ●Anonymous FTP Stealer ●Anonymous Text Encrypter ●Anonymous Tinypaste Uploader ●Ashiyane SQL Scanner ●Base64 Image Encoder-Decoder ●BTI Admin Page Finder v2 ●BTI HTML Encoder-Decoder ●BTI Multi Site Checker ●BTI Reverse IP Domain Check v2 ●ChromePasswordDecryptor ●CSS Minifier v2 ●Deface Page Created ●Dork Searcher Setup v1091 ●dorkinj ●DorkTools ●Eternals WebBrowser ●Explode Web Scanner ●ezDataBase_Defacer ●Fiddler Web Debugger Setup ●Gklspy ●Google URL Extractor ●Gr3eNoX LFi Exploiter ●Hacker’s Browser v2.0 ●Injection Framework – Automatized Sql ●Injection Tool ●Iron Web application Advanced Security ●testing Platform ●Joomla Security Scanner ●JSQL-Injection ●Mass Dork Scanner v1.0.0.1 ●Multi Vuln Checker ●nmap ●Spider Ma