Hello friends, Today we are going to discuss about the Ethical hacking tools. Which our ethical hackers and all others hackers use.And how can they use them. What the purpose to use these tools.

Hacking tools are computer programs and script that help you to find that the weakness of system,Web applications,network and servers. There are many hacking tools which are available in Hacking market. You can use them for a good way or a bad way also. Few hackers like White Hat Hacker,Blue Hat Hacker use this tools to save their network or their organization network. And most of the hackers use it to their own-self or destroy someone system or harm someone for personal reasons.

So lets know about these hacking tools.


NMAP (Network Mapper) is a free and open source tool for network discovery and security auditing. Many system and network administrators also find it useful for task such as network inventory , managing service, upgrade schedule, and monitoring host or service uptime.

NMAP uses raw ip packts in novel ways to determine what hosts are available on the network, what service are they using, version, ports. From this tool you can find that your system loop holes, weakness point and how can a hackers enters in your system.



John The Ripper is a free password cracking software tool. Initially developed for the UNIX operating system. But now it runs on 15 different platforms (11 of which are architecture-specific versions of UNIX DoS, Win 32 Beos and OpenVMS). This hacking tools is use to detect weak password of your system or your network security server. This software can run a wide variety of password cracking techniques against the various user accounts on each operating system.

It can be run against various encrypted password formats including several Crypt password hash types.It is also useful when it comes to crack the password of window OS, Linux OS and the other operating system. You can use this hacking tools in oracle windows also. It is one of the most popular password testing and breaking programs as it combines a number of password crackers into one package.


Metasploit is an open source Pen Testing Framework written in Ruby. It Acts as a public resource for researching security vulnerabilities and developing code. This allow network administrator to break into his own network to identify security risks and document which vulnerabilities need to be addressed first. It is also one of the few ethical hacking tools used by beginners hackers to practice their skills. it allows you to replicate websites for phishing and other social engineering purposes.

This hacking tool is use to search loop holes in your website or your system. Ethical hackers also use this hacking tools to hack system. But when they get permission from the owner of the system. But the other hackers use this in a wrong way they don’t want the permission from the owner to use this Hacking tool.

Founder of the METASPLOIT is H.D MOORE.


WIRESHARK is also a open source software thats allow you to analyze network traffic in real time.In other words you can say that a packet sniffer tool. Wireshark is widely known for its ability to detect security problem in any network, as well as for its effectiveness in solving general network problems. While sniffing the network, you are able to intercept and read results in human-readable format, which make it easier to identify the problems. threats and vulnerability in network.

This hacking tools supports upto 2000 network protocol. It is available on the all major operating system. So its make more easier to use this hacking tool. How to Hack FB Account



NIKTO is an open source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. NIKTO is known as the part of Kali Linux Distribution. Other popular linux distribution such as Fedora already come with Nikto available in their software repositories as well.

This security tool is used to scan web servers and perform different types tests of against the specifide of remote host. Its clean andsimple command line interface makes it really easy to launch any vulnerabilities testing against your target. It detects default installation files on any operating system and detects outdated software application also. This software is integrated with Metasploit Framework. This hacking tools execute dictionary-based brute force attacks and export the result in plain text, CSV ot HTML files.

Founder of NIKTO is CHRIS SULLO.


KISMET is one of the most used ethical hacking tools. It works as a network detector, packet sniffer and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless cards which supports raw monitoring mode. This programs runs in different operating system like linux, Mac os, windows and many more Operating system.

Wardriving is the act of searching for wi-fi wireless networks by a person usually in moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet. And the one of the most usable software is KISMET. Hackers mostly use this hacking tool to enter in your systems. And then they will sniff your packets or any personal data.



NESSUS is an open source network vulnerability scanner that uses the common vulnerability and exposures architecture for easy cross linking between compliant security tools. Nessus Attacks Scripting Language (NASL) is a simple language that describes individual threats and potential attacks.

This hacking tool compatible with computers and servers of all sizes. It can detect a security holes in local or remote hosts.The nessus server is currently available for Unix, Linux and FreeBsd. The client is available for Unix and Windows operating system.


Read My Blogs in Hindi Also



Hello, I'm a newbie In this field but i will try to do my best ...


Leave a Reply

Your email address will not be published. Required fields are marked *