Sunday, 17 November 2019  
 
Dolvin Blog
Dolvin Blog » Our DB
Hacking Toolbox
by. Dolvin ≈ February 23, 2008
The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it.

These are the Hacking Toolbox that hacker must have:
  • Backdoor: Intrude computer and control the computer with client program.

  • Crack Tool: crack passwords of systems or applications, crack the serial numbers.

  • Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it.

  • DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer.

  • Document: Documents about hacker, cracker, etc.

  • E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several tools about e-mail, for example, email bomber, tool to find someone's email address, etc.

  • Editor: Edit or modify your program with them.

  • Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.

  • Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one.

  • ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ's password, sharing your files, and encrypting your ICQ messages, and so on.

  • Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password.

  • MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.

  • Packet forging: Modify the data packet on network at will.

  • Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.

  • Scanner: Acquire the system information, for example, open ports, OS, and so on.

  • Sniffer: Intercept and capture the data on the network.

  • Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on.

  • Source code: Source code of many tools.

  • Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.

  • Virus: Source code of virus and executable virus.

 
<< back to Dolvin's Blog




:: Your Comment of Hacking Toolbox ::

February 27, 2008

May 29, 2008
Page : 1 

:: November '19 ::
 
 
S
M
T
W
T
F
S
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
 
   

:: My Blog List ::
 
   
   

:: Blog Category ::
 
 
» Books
» Christian Soul
» Fashion
» Film
» Foods & Drinks
» Games
» General Info
» Health
» Jokes
» Love
» Music
» My Life
» Programming
» Technology
 
   

:: Site Links ::
 
 
» Angel Sulistyo
» Anton Ongsono
» Darwin
» Fellys
» Inge
» Kado Imut
» Koleksi Unik
» Lie Fung
» Lintaka
» Lobak
» Rosrita
 
   
 
:: Dolvin Website | Dolvin Blog | Our DB ::
Copyright © Lavinia - 2006 - 2019