Top 10 Security Assesment Tools 2020
#1) Nmap
Nmap has been ported to several other platforms, including Microsoft Word, though Linux remains the most popular. It can adapt to latency (the amount of delay time experienced by a system) and other conditions of the network.
Features of Nmap include host discovery (identifying the hosts on a network); operating system detection (determining which OS is being used by a network); port scanning (probing for open ports on a host or a server); scriptable interaction; and version detection (determining the version number and the application name of a service by listening in on a remote device). On its website may be found password crackers, sniffers that intercept traffic as it passes over a network, and vulnerability and web scanners. Out of all the tools, Nmap is one of the best penetration testing tools available.
Download Link : Nmap
*************************************************************************
#2 ) Rapid 7 (Metasploit )
This is the most advanced and popular Framework that can be used to for pen-testing. It is based on the concept of ‘exploit’ which is a code that can surpass the security measures and enter a certain system. If entered, it runs a ‘payload’, a code that performs operations on a target machine, thus creating a perfect framework for penetration testing.
It can be used on web applications, networks, servers etc. It has a command-line and the GUI clickable interface works on Linux, Apple Mac OS X and Microsoft Windows. Although there might be few free limited trials available, this is a commercial product.
Download link: Metasploit Download
********************************************************************
#3) Wireshark
This is basically a network protocol analyzer –popular for providing the minutest details about your network protocols, packet information, decryption etc. It can be used on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many other systems. The information that is retrieved via this tool can be viewed through a GUI or the TTY-mode TShark utility. You can get your own free version of the tool from the link below.
Download link: Wireshark download
********************************************************************
#4) Kali Linux
Kali Linux is an open source project that is maintained by Offensive Security. Few prime features of Kali Linux include Accessibility, Full Customization of Kali ISOs, Live USB with Multiple Persistence Stores, Full Disk Encryption, Running on android, Disk Encryption on Raspberry Pi 2, etc.
Tools Listings, Meta-packages and version Tracking are some of the Penetration Testing tools present in Kali Linux. For more information and in order to download, visit the below page.
Download link: Kali Linux download
**************************************************************************
#5) w3af
W3af is a Web Application Attack and Audit Framework.
Some of its features include fast HTTP requests, integration of web and proxy servers into the code, injecting payloads into various kinds of HTTP requests etc.
It has a command-line interface and works on Linux, Apple Mac OS X and Microsoft Windows.
All versions are free of charge to download.
Download link: w3af download
***********************************************************************
#7) John The Ripper
Another password cracker in line is John the Ripper. This tool works on most of the environments, although it’s primarily for UNIX systems. It is considered as one of the fastest tools in this genre.
Password hash code and strength-checking code are also made available to be integrated into your own software/code which I think is very unique. This tool comes in a pro and free form. Check out its site to obtain the software on this page.
Download link: John the Ripper download
************************************************************************
#8) Burpsuite
Burp suite is also essentially a scanner (with a limited “intruder” tool for attacks), although many security testing specialists swear that pen-testing without this tool is unimaginable. The tool is not free, but very cost effective.
Take a look at it on the below download page. It mainly works wonders with intercepting proxy, crawling content and functionality, web application scanning etc. You can use this on Windows, Mac OS X and Linux environments.
Download link: Burp suite download
*******************************************************************
#9) Cain & Abel
If cracking encrypted passwords or network keys is what you need, then Cain & Abel is the perfect tool for you.
It uses network sniffing, Dictionary, Brute-Force & Cryptanalysis attacks, cache uncovering and routing protocol analysis methods to achieve this. Check out information about this free to use a tool at the below page. This is exclusively for Microsoft operating systems.
Download link: Cain & Abel download
**************************************************************************
#10) Zed Attack Proxy (ZAP)
ZAP is completely free to use, scanner and security vulnerability finder for web applications. ZAP includes Proxy intercepting aspects, a variety of scanners, spiders etc.
It works best on most platforms. For more information and in order to download visit the below page.
Download link: ZAP download
**************************************************************************
If you have any important tool that you are using and it is not on the list, you can drop a comment, and I will try to add it.
Network Architect @ Fortune 500 Companies | Security Consulting, Network & Cloud Services
6 年Smart...very smart...