The global cybersecurity situation is not yet in its prime and threatens the entire tech industry. The cyber cold war that experts are talking about continues at the top, while companies, administrations and critical infrastructures are increasingly put under pressure by this authenticity digital pandemic what ransomware has become. The section on client machines and consumption isn’t much better.
If the SolarWinds case is far from clear and, from what we know so far, marks the worst security breach to date of this century, the Colonial Pipeline incident is another hair-raising incident. How people (presumably from Russia) can get America’s vital infrastructure on the ropes is another wake-up call to the need to invest more and better in cybersecurity.
And at the user level, what to say. apart from Ransomware This is the greatest global threat to any operating system, platform, or device. There’s no shortage of campaigns for Phishing who employ identity theft and, in general, any means of introducing malware into ever more numerous, sophisticated, dangerous, and massive attacks aimed at financial gain, data theft, and device control.
In addition, the COVID-19 pandemic has complicated all scenarios as employees and students have had to move to generally less sheltered residential areas than business or administrative ones. A challenge to be protected from viruses, Trojans and samples of all conditions and for all platforms, not to mention the increase in misinformation, fake news and information manipulation in general, which some analysts consider to be another computer security issue.
Although there are measures to combat the most widespread threats like phishing or ransomware that are suitable as general protection for all types of users, there is another cybersecurity strategy that is used by more advanced users and system administrators and that proactively choose to do so Always stay one step ahead of events and test network security like an attacker.
Using these tools is not easy. It takes time, caution in its use, and some understanding of how a computer network works. The benefits are remarkable, however, as they allow us to identify which areas are the “weak points” of the network and correct them before they are the “bad guys” who discover and exploit them. Aside from major commercial developments that we don’t even have access to or that we can’t pay for because they are reserved for large corporations, agencies, and governments, these tools are widely used in (good and bad) hacking Analysis of vulnerable networks.
We remind you of some of the most widely used hacking applications, all of which are free to use, and some open source applications. This is where we need to give due consideration: Use them at your own risk, for educational purposes only and to test your own network, not others for whom you are not authorized.
A de facto standard that has been with us for more than twenty years and which the oldest in the place will remember as ethereal. It is used equally in companies, educational systems or private households snoop, Packet grabber, developed for the analysis and solution of network problems, software and development of communication protocols.
It enables the visualization of the activities of the users in the network and the detection of “strange” traffic, which is related for example to a Trojan horse. It works over Ethernet, IEEE 802.11 or PPP networks and the data captured can be queried via a graphical user interface or a command line terminal. Wireshark is free and open source and available for Windows, macOS, Linux, FreeBSD, and others.
It’s another reference hacking application. This network mapper is even older than Wireshark and just as interesting. It is one of the most important applications for system administrators. It is used to perform Penetration testIt identifies the open ports or the services that are running, provides the response from computers to a ping, and generally allows verification of a network’s security and possible vulnerabilities.
Its popularity is so great that we have seen it in several films like The Matrix Reloaded or Battle Royale. Nmap is free and open source and works on Linux, Windows, and Mac OS X.
Originally open source, it later became proprietary software, but remains free for home users with a seven-day trial version. It advertises itself as Vulnerability scanner Most popular on the Internet, used by 27,000+ organizations worldwide. Nessus looks for open ports and attempts attacks with various known exploits.
For monitoring purposes in your own home network, you must deactivate the “Unsafe test” option in order not to damage the system. It works on Windows, Mac OS X, and Linux and can run on a home computer, in the cloud, or in a hybrid environment.
One of the most complete applications to discover attacks the man in the middle in your home network or in any LAN. It is an infiltration technique that is widely used by cyber criminals, as we have seen in large-scale attacks like Logjam, the critical vulnerability that affects the TLS protocol that allows connections to be restricted to an export level of 512-bit Decrease encryption to decrypt communication.
Ettercap works on all major operating systems and can be downloaded from their website.
Cain & Abel
It’s a tool of Password recovery for Windows operating systems. You can recover different types of passwords using dictionary, brute force, cryptanalysis attacks, recording VoIP conversations, or recovering wireless network keys.
In addition to the ability to recover passwords, it is designed to be useful to a network administrator, security advisor or professional, and to evaluate the security of our network. Development has stopped but continues to work and can be downloaded from various websites on the Internet.
It is a Web server scanner More than 6,700 potentially dangerous files or programs and 1,250 web servers are analyzed here. It also looks for server configuration items such as the presence of multiple index files and HTTP server options and tries to identify installed web servers and software. Scan items and plug-ins are updated frequently and can be updated automatically.
Useful when you consider that hackers have put web servers on their retinas as a method of entry into the network to take advantage of insecure WordPress implementations or outdated Apache servers. Nikto2 is free and open source and can be downloaded from its repository on GitHub.