Archivo de la categoría: Unit 2

24/11/20: Blog 3: Top 10 Most Popular Ethical Hacking Tools (2020 Rankings)

Blog 3:  Top 10 Most Popular Ethical Hacking Tools (2020 Rankings)

Last Updated:July 20, 2020

Best open source online Ethical Hacking Tools used by hackers:

If hacking is performed to identify the potential threats to a comp

uter or network then it will be an ethical hacking.

Ethical hacking is also called penetration testing, intrusion testing, and red teaming.

Hacking is the process of gaining access to a computer system with the intention of fraud, data stealing, and privacy invasion etc., by identifying its weaknesses.

A person who performs the hacking activities is called a hacker.

There are six types of hackers:                  

  • The Ethical Hacker (White hat)
  • Cracker
  • Grey hat
  • Script kiddies
  • Hacktivist
  • Phreaker

A security professional who uses his/her hacking skills for defensive purposes is called an ethical hacker. To strengthen security, ethical hackers use their skills to find vulnerabilities, document them, and suggest ways to rectify them.

Companies that provide online services or those which are connected to the internet, must perform penetration testing by ethical hackers. Penetration testing is another name of ethical hacking. It can be performed manually or through an automation tool.

Ethical hackers work as an information security expert. They try to break the security of a computer system, network, or applications. They identify the weak points and based on that, they give advice or suggestions to strengthen the security.

Programming languages that are used for hacking include PHP, SQL, Python, Ruby, Bash, Perl, C, C++, Java, VBScript, Visual Basic, C Sharp, JavaScript, and HTML.

Few Hacking Certifications include:

  1. CEH
  2. GIAC
  3. OSCP
  4. CREST    (…)

To Read more click on the link below and keep on reading about all the tools available!

Now, answer the following questions:

1 Do you think it should be illegal to hack into a computer or spread computer viruses? Why, or why not? 2 Internet crime, or “cybercrime,” is seen as very difficult to combat. Why do you think this is so? 3 If technology is seen as a “male” interest, how can we encourage women to be more involved in the tech and IT community? Write your comments and participate!